_______________________________________________________________________ _______________________________________________________________________ THE SYNDICATE REPORT Information Transmittal No. 21 (Part 1 of 2) Released March 2, 1989 Featuring: Editor's Note "PCP Hacking Statistics" AT&T Works on Making Unix Less Vulnerable MCI Mail Rates and Info Change AT&T Bellcore & Tiniest Semiconductors Ever Common Unix Passwords Briefs notes from The Report Vocabulary Tonic by The Sensei Editor Syndicate Report Magazine _______________________________________________________________________ _______________________________________________________________________ EXPOSITION: TSR Once again, The Report accepts outside sources. Anybody can write/provide information to The Syndicate Report. Articles/Information may be provided through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as Busts, Phreaking, Hacking, Data / Telecommunications, and new developments on any the previous mentioned specialties will be: accepted, labeled, and given full actual credit to the article/info provider(s), or writer(s). -- ** All articles have been presented by me unless shown at the end of the article as the information provider(s), or writer(s). ** _______________________________________________________________________ _______________________________________________________________________ EDITOR'S NOTE: TSR " PC PURSUIT HACKING STATISTICS " PCP password hackers are welcome tools for virtually all types of users: Phreaks, Pirates, Terrorists, system Hackers, etc. PCP has become the perfect way to dial long distance with low error ratios, flexibility with ID codes/passwords used on other networks and most importantly, safety. Telenet is because of the huge number of calls that are handled every day by the big networks, keeping track of where every call and connection is made from is financially impractical. It is also very easy to disguise your location using the network, which makes dial LD even more secure. As time and technology interface, code abusing slowly becomes past-time reminiscence for busted hackers. In response, PCP becomes the only resource for paranoid hackers, alike. Along these lines of paranoia, the need for PCP password hackers increases. After all the years that PCP has existed, I've only seen 5 PCP password hackers. And of the 5 hackers, 3 of these devices were totally useless for obvious reasons, upon execution... Some of the obvious problems indicated : No online modem configuring. Incomplete documention & Technical Information. These apply to the anti-user friendly hacks. Inaccurate response detecting positive completion of passwords. Ineffective random variable password generating. ...and with all beta programs -- minor bugs. With this in mind, I'd like to add some PCP Statistics. PCP ID's and Passwords are not easy to get. Format area: PCP12345 and ABCD6789. The first thing a hacker considers when using a hacker is, what? PCP ID to use. Most are between 10,000 and 40,000. I have never seen an ID over 40,000. PCP doesn't disclose annual PCP profits, nor the number of subscribers they currently have. Although the number by many hackers is approximated around 5,000 to 6,000. Keep in mind that businesses use PCP accounts too, in case your criticizing that you've never seen 5,500 subscribing hackers. Therefore, the change of gaining a valid ID are significantly good. Of course, the PCP IDs do not bug hackers. The complexed password scheme is the brain parasite. First there is the 4 random letters, then the 4 random numbers - joined. In essence, what a hacker is dealing with is 2 passwords beyond 1. The LETTERS, and the NUMBERS must match up - not the entire string as a whole since the letters stop after 4, then take on an entire new syntax. I've seen some passwords that had numbers in the letter positions, and vise verse for the letters. Majority however stay in the above listed format. If interested in a PC Pursuit password hacker, consider using Phry Code Pro., by The Exciter / 612. Latest version can be found on RADIO WAVES. ;The Sensei / Editor TSR _______________________________________________________________________ _______________________________________________________________________ AT&T WORKS ON MAKING UNIX LESS VULNERABLE: TSR (iw 2\11) Enhanced security features are being developed for Unix System V.4.1. AT&T's vice president stated. His keynotes to the Usenix Tech. Conference in California insisted that open, multivendor networks are not centrally more susceptible to security violations than proprietary systems. Security is on the mind of every Unix user, particularly when Unix-based systems are to be used for mission-critical and strategic applications, like running a high end workstation. The new version, on Unix, will achieve the National Security Agency's B2 level of security, and will actually also have some features of the B3 level as well. Powerful security tools exist in the current version of Unix V, but have often gone unused by administrators because of a lack of quality documentation and training. AT&T will also be adding surreal security features to System V.4.1., the first revision of the sill unreleased system V.4.0. Procrastination seems to be top priority for many software vendors - just look at Lotus. Well, Unix won't be very welcome for the Hacking Community, and myself. The features/improvements include: Access methodology beef up Maintenance of Data Integrity The denial of service Hacker/Intruder/Terrorist containments ...and the execution of the "superuser" status. About the "superuser" chop. This is the most popular status, especially for hackers, and AT&T takes it out. It did more good than bad in the long run. In its place will be a finer distinction in status. There will be a status of "superuser" that is only used for mounting the systems. That user will not be able to access other "superuser" privileges. Control of the front end of system access - password security - will be enhanced by the use of "shadow" password files. The files containing the password (etc/passwd) have been far to easy to access. So, restricted access to files, along with a form of activity audit, which will be used in System V.4.1. Actually, the greater sense within the system, including user and group IDs, aging information, and a command and log-in audit. Editor's suggestions: Keeping systems resources in locked rooms/shells, to prevent shaking of the shielding of shells/rooms, which can reveal information to external devices. AT&T should also use a dedicated printing resource to each high level of security - a printer on each label page? Well, that would code a lot of money, but LD services do it all the time, along with personal supervision. Then theres Fiber-Optics, and the security advantage there. As printed in THE SYNDICATE REPORT #20 (part 2), where an article explains the procedures in Tapping Fiber Optic cables. Then again, it's hard to break into a FO cable without bringing the system down, with a nice alarm response. :::::::::::: Information written by The Sensei (TSR Editor) ::::::::::: _______________________________________________________________________ _______________________________________________________________________ MCI MAIL RATES AND INFO CHANGE: TSR (u.t 2\15) Beginning early February 1989 MCI Mail will LOWER the cost of Instant Messages and domestic Fax Dispatch. In addition, we will offer FREE 800 Access, FREE Advanced Service and FREE Shared Lists. MCI's new retail prices are as follows: :: Instant Messages :: 0-500 Characters $ .45 501-2500 Characters $ .75 2501-7500 Characters $1.00 Each Additional 7500 Characters $1.00 :: Domestic Fax Dispatch :: First Half Page $ .50 Each Additional Half Page $ .30 :: Access :: 800 Access No Charge U.S. tymnet Access $ .25/ Per Minute International tymnet Access $ .30/ Per Minute :: MCI Mail's new 800 numbers will be :: Access Speed 800 Telephone Number 300, 1200 bps...........................800-234-MAIL 2400 bps............................... 800-456-MAIL Lotus Express & Desktop Express.........800-825-1515 (up to 2400 bps) _______________________________________________________________________ _______________________________________________________________________ AT&T BELLCORE & TINIEST SEMICONDUCTORS EVER: TSR (b.w 2\27) As the transistors on computer chips steadily shrivel away toward nothingness, scientists are faced with a task much like figuring out how many atoms can dance on the head of a pin. Researchers as AT&T Bell Laboratories are closing in. They have devised a method of producing the tiniest semiconductor crystals ever: clusters containing as few as 100 atoms. They are so far too tiny to 'print' with even the wispiest microcircuit. Still, they may have practical applications. That's because a young polymer chemist, has developed a way to keep the clusters from combining into larger clumps, as they otherwise would do. He grows each microcrystal inside a minuscule water droplet a thousand times smaller than the diameter of a human hair, then replaces the water with organic molecules. "It's like putting the cluster in a little plastic bad," he says. The clusters can be 'tuned' for specific jobs because they absorb different wavelengths of light as they decrease in size. So they could be used for optical switches in future "optoelectronic" chips. _______________________________________________________________________ _______________________________________________________________________ COMMON UNIX PASSWORDS: TSR (p.p 2\21) The subsequent list of words are a list of commonly used passwords, use on Unix computer systems. The list also contains syntax from the illustrious UNIX Internet Worm on November, 1988. Combine them into a favorable Unix Hacker. _____________________________________________________________ :::::::::::::::::::::::::::: Unix Passwords ::::::::::::::::::::::::::: _____________________________________________________________ aaa daniel jester rascal academia danny johnny really ada dave joseph rebecca adrian deb joshua remote aerobics debbie judith rick airplane deborah juggle reagan albany december julia robot albatross desperate kathleen robotics albert develop kermit rolex alex diet kernel ronald alexander digital knight rosebud algebra discovery lambda rosemary alias disney larry roses alpha dog lazarus ruben alphabet drought lee rules ama duncan leroy ruth amy easy lewis sal analog eatme light saxon anchor edges lisa scheme andy erenity angerine scott arrow elizabeth maggot sex arthur ellen magic shark asshole emerald malcolm sharon athena engine mark shit atmosphere engineer markus shiva bacchus enterprise marty shuttle badass enzyme marvin simon bailey euclid master simple banana evelyn maurice singer bandit extension merlin single banks fairway mets smile bass felicia michael smiles batman fender michelle smooch beauty fermat mike smother beaver finite minimum snatch beethoven flower minsky snoopy beloved foolproof mogul soap benz football moose socrates beowulf format mozart spit berkeley forsythe nancy spring berlin fourier napoleon subway beta fred network success beverly friend newton summer bumbling george osiris tape cardinal gertrude outlaw target carmen gibson oxford taylor carolina ginger pacific telephone caroline gnu painless temptation castle golf pam tiger cat golfer paper toggle celtics gorgeous password tomato change graham pat toyota charles gryphon patricia trivial charming guest penguin unhappy charon guitar pete unicorn chester hacker peter unknown cigar harmony philip urchin classic harold phoenix utility coffee harvey pierre vicky coke heinlein pizza virginia collins hello plover warren comrade help polynomial water computer herbert praise weenie condo honey prelude whatnot condom horse prince whitney cookie imperial protect will cooper include pumpkin william create ingres puppet willie creation innocuous rabbit winston _____________________________________________________________ Paean : The Merc V.4.1. passwd!locator Shooting Shark Gfiles : Unix hacker The Mentor LOD/H : Pheonix Project 512-441-3088 TSR Dedicated Field users ::::::::::::::::::: Information provided Multiformly :::::::::::::::::: _______________________________________________________________________ _______________________________________________________________________ ::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES::::::::::::::::::::: // Bell 900 Battles // AT&T, MCI and US Sprint are arming themselves for a new round of competition in interactive 900-call services, according to TSR sources. AT&T has been hoping for FCC approval of its interactive 900 tariff. MCI has been testing and plans to offer a 900 service next month. And US Sprint plans to begin customer testing of its service in April '89. :::::::::::: Information provided by MPhone / 203 ::::::::::: _____________________________________________________________ // NSA Chooses Its Security // The National Security Agency has chosen the AT&T security code algorithm called Code Excited Linear Predicted. NSA will propose the algorithm be adopted as a government-wide standard. Production is shared by AT&T, Motorola and GE RCA. The algorithm is a 4,800 bits-per-second coder that checks speech patterns. _______________________________________________________________________ _______________________________________________________________________ ::::::::::::::::::::::::: TSR Vocabulary Tonic :::::::::::::::::::::::: What "Vocab. Tonic" is, is a list of acronyms and definitions to help education the ignorant hacker. With an extensive vocabulary, there is virtually nothing one can't learn. Study on... DS - Digital Switch. A switch in which connections are established by operations on digital signals without conversion to analog. DSX - A digital cross connect field which can be utilized for DS1 (Digital Switch), DS2 or DS3 level cross connections at a digital level RPOA - Registered Private Op. Agencies (ID of online system). SCC - (or SCCS), Switch Control Center. SCC has overall responsibility for the administration and maintenance of BOC Central Offices. Responsibilities include installation and maintenance Control Office for FG B, C, and D. SCC also handles specific trouble reports. TAMS - System where NUIs are checked by a central database when you try to connect to an address, on GTE Telenet. TD - Terminating Direction. The use of Access Service for the completion of a call from an IC (Interexchange Carrier) location to an end user. _______________________________________________________________________ _______________________________________________________________________ :::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::: "They [Hackers] have this need to find the answer." To subscribe to the 2600 Magazine send 15$ to: 2600 Magazine P.O. BOX 752 Middle Island N.Y. 11953 Corley, Editor 2600 Magazine _______________________________________________________________________ _______________________________________________________________________ TSR will accept additional sponsor/support Systems. If you have a certain interest in the Report, and wish to provide support to TSR -- Leave your BBS number -- and any other information on RADIO WAVES Bulletin Board Systems. _______________________________________________________________________ _______________________________________________________________________ Pheonix Proj. LODH :: 512-441-3088 ----- Lunatic Labs :: 415-278-7421 At Login: Any UNIX Default PW P/H System HackersDen 2600 #5 :: 612-522-3959 ----- Hack Shack @ :: 214-422-4307 P/H-Files BBS Login: Any UNIX Default Pass RADIO WAVES System :: 612-471-0060 - Syndicate Report Support BBS - _______________________________________________________________________ _______________________________________________________________________ This concludes this Transmittal No. 21 (Part 1 of 2) Released March 2nd, 1989 by The Sensei Editor of The Syndicate Report _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ THE SYNDICATE REPORT Information Transmittal No. 21 (Part 2 of 2) Released March 2, 1989 Featuring: Editor's Note "Cyberpunks" Vs. The Media Telecommunications Events, Conferences, Seminars, and Shows Software Links Unix System to Atomic Clock Briefs notes from The Report " Hackers Fail Raiding ATMs " by The Sensei Editor Syndicate Report Magazine _______________________________________________________________________ _______________________________________________________________________ EXPOSITION: TSR Once again, The Report accepts outside sources. Anybody can write/provide information to The Syndicate Report. Articles/Information may be provided through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as Busts, Phreaking, Hacking, Data / Telecommunications, and new developments on any the previous mentioned specialties will be: accepted, labeled, and given full actual credit to the article/info provider(s), or writer(s). -- Special Editor, TS, comments are placed between brackets. Example: [ Hi. ] ** All articles have been presented by me unless shown at the end of the article as the information provider(s), or writer(s). ** _______________________________________________________________________ _______________________________________________________________________ EDITOR'S NOTE: TSR Just a quick note. Just in case many of you don't know...I distribute an introduction package at least 3 days every month before actually releasing The Syndicate Report. These can be found on the systems listed at the end of this part of TSR. ;The Sensei / TSR!612 _______________________________________________________________________ _______________________________________________________________________ "CYBERPUNKS" VS. THE MEDIA: TSR (s.t 2\27) The following article can from a newspaper local to myself. The newspaper is the "Star and Tribune." I, The Sensei, usually don't print up verbatim copies of articles, but this articles was very interesting and entertaining. Some of the information presented in insulting to most Hackers/Phreaks, etc., so I'm going to comment on parts of the article. Comments will be in designated brackets, like this: [ Blah, Blah...Har Har -TS ] _____________________________________________________________ Silicon Valley -- A local Cop patrolling after midnight witnessed an unusual sight, even for this center of high technology: Two teenagers wedged in a phone booth, laboring over the keyboard of a laptop computer clipped into the telephone line. [ This is very humorous for me...I can't help wondering what technique these guys are using to access Bell Fone's, heh. ] The youths, who were arrested for telephone fraud and computer abuse, belong to a shadowy culture of computer vandals committed to illegally entering and frequently tampering with the computer networks on which society has come to rely. Those in this expanding underground -- known as CYBERPUNKS to themselves and some social scientists -- have broken into corporate and military computers and tampered with telephone billing switching equipment, sometimes altering services and monitoring telephone lines. Some have boasted of illicitly entering computer used in stock-market trading. [ First of all, I protest to the term, "Cyberpunks." No hacker I know of as called themselves Cyberpunks. If anyone reading this does, your probably not a considered a hacker by most. Second, Social Scientists don't know anything about hackers -- they're just another worthless clan of scientists trying to shape society as they wish. ] [ The newspaper then goes on to refresh our memories about the Morris Jr. Unix WORM, haven't we heard enough about his guy. And it was a really complicated set of code he set for his so-called CSci Project. ] Articles describing how to write viruses have appeared in several publications that are widely circulated within the underground. Writing in the journal 2600, which says it speaks for the computer underground, an author using the pseudonym "The Plague" described how to create a virus. "If people's data is destroyed, then so be it," he wrote. "If people are stupid enough to accept pirated software, then they deserve to be punished," says Plague. [ Well, The Plague has it all wrong. Viruses are not ONLY in pirated software, my friend, they creep within all types of programs. Your just adding to the problem. It's goes against 'Hacker Ethics,' but the information should not to suppressed from the hacking community. ] The term CYBERPUNK is a reference to a popular science fiction genre that deals with an intersecting world of high technology and outlaw society. "This is the case of art driving reality," said one Social Scientist at the Institute for the Future, Calif. "You have a small group who is actually going it, and a large pool that is buying into what they are doing and redefining reality." [ Yet another scientist from a corrupt institution, making conclusions based on a small fraction of neo-hackers. ] Cyberpunks often are called HACKERS, but computer scientists are careful to note that not all hackers are malicious. The term originally referred to researchers who were committed to designing advanced computer hardware and software. [ This is the first decent statement I've read. ] Another often-heard term is "PHREAKING," which is the illegal use of telephone systems. "Phreaking is moral," said an 18 year-old hacker who calls himself, "Frank Drake" in messages on the bulletin boards. "There is no theft involved. It's not theft of services, because this equipment would otherwise be idle." [ It's about time these Media-Types informed the public of my favorite hobby, Phreaking. And about the definition Frank Drake gave. "Illegal use of Fone System." ? Sorry, not all of the uses by phreaks is illegal. More than anything, phreaking is basically composed of "Learning about the Bell system, along with illegal use." ] Computer experts working in the industry who have become involved with malicious hackers see them as computer addicts possessed by an antisocial obsession. "They're misfits, losers or troubled individuals lacking a sense of duty or morals," said a computer researcher at a Silicon Valley institution. [ Misfits? Losers? Antisocial individuals? This is another scientist shooting his mouth off with little support. The idea of hackers being social outcasts, or losers is a common misconception by many. Most malicious computer hackers are party animals when given the right conditions. And if one was told he is labeled an, "Outcast, Loser etc.", the person talking would get an entire new face of the word MALICIOUS. Namely a 99e99 dollar fone bill, credit check and unchecked, and maybe a subscription to every magazine on the face of the Earth. ] In recent years this researcher has offered four underground hackers programming jobs to try to channel their energy away from destructive use of computers. In each case the experiment ended in failure, the scientists said. The researcher asked not to be indentified, and his reason is revealing. He fears that the CYBERPUNKS/Hackers are so skilled at tampering with computers that they might be able to alter his credit rating or have his electricity turned off. [ Oh my. Will these guys never learn? Hackers are not stupid "Lab Rats." They want a challenge, away from sitting at a computer programming for another person. And this scientist is concluding his entire experiment on just a few hackers. Yes, his fear of hackers is valid. I am now thinking of ways to find out who this guy might be. The credit rating would be no problem, same with the electricity. A scientist without electricity, is like a hacker without Telenet. ] "Every single one of them had deep psychological problems," he said. Some members of the hacker underground appear to agree with this psychological assessment. [ Hah! No comment...for obvious reasons. ] "They have this crazed need to find the answer," said Eric Corley, edit of 2600 Magazine. Corley, whose personal hacking resulted in three brushed with the law before he started the publication in 1984, said: "They keep exploring where they know they shouldn't go. A true hacker won't stop just because he gets in trouble." [ Corley is totally correct here, of course. But I think some hackers don't stop hacking, because some are just over powered with the need to learn. I never stopped hacking after by bust for many reasons. I the primary reason was because I'm not a quitter, and I looked back on how much had I learned. With the learning, fun followed. ] Although computer experts believe the number of outlaw hackers is growing, the behavior they exhibit is not new to the high-tech world. For example, a computer programmer, John Draper, spent six months in jail during the 1970s for illegal use of the telephone network. Draper's nickname, "Captain Crunch," derived from his discovery that a whistle that came as a prize in a cereal box was tuned to the correct frequency to unlawfully manipulate fone company switch gear. [ Hmmm. Every hacker knows all this already. At least a true hacker should know his/her past. But the thing I can't help wondering is, what was Captain Crunch doing with a whistle from the "Captain Crunch cereal" box? And why was he blowing it into the fone. Makes me laugh if you think about it. Another thing, anyone with two front teeth can blow a 2600 Hz tone whistle. ] ;The Sensei / TSR!612 _______________________________________________________________________ _______________________________________________________________________ BUSTING TELEPHONE SOLICITORS: TSR (st.cit 2\27) Join to fight telephone solicitors! How you ask? Read on... :::: Illustration, Exampling :::: "Have you ever off and had a fantasy of going to the library and finding out who owns the companies that call YOU, interrupt you, and calling THEM back? It makes you happy for a while. Particularly when working 11 to 7 shift, you'd think of the companies that had awoken you (using YOUR private fone) at noon." "One nurse I know did something like that to a persistent insurance salesman. One day she got awake and alert enough to get his name and number and promised to call back. She did. At 2 AM, announcing that it was HER working day, and she was now awake and would like to discuss the policy....He never called her back." -TS :::: Tips Offs to a Fone Scam :::: If it sounds too good to be true, it's probably a scam. Some of the most popular promotions among telephone con artists include prize offers to get you to buy water purifiers or vitamins, magazine subscriptions, PENNY STOCKS, precious metals, travel and cellular telephone lottery applications. Be skeptical of says such as, "This is the best deal you'll ever find," or "Double your money, no risk!" The government, Federal Trade Commission estimates that Americans lose 1$ billion a year from the deceptive peddling of goods and services over the fone. Other organizations say it's much higher. One might suggest lobbying for stricter FED laws governing 'telemarketing businesses.' :::: Striking Back at 'The Solicitor' :::: o Do NOT hang up on telephone solicitors. This just allows them to make another call 200 milliseconds later. Listen to them. Ask stupid questions. Drag out conversation. Contemplate placing an order, then don't. Or start to place an order, then change your mind. o Try wasting their time as much as possible, cackle insanely and hang up. Or give them the raspberry and yell, "Only f00ling!121!!&!" o Remember always, that these twits are partially paid on commission. The more of their time you waste, the less they are gonna earn. Eventually they may quit, and if we're persistent enough, maybe someday nobody will WANT to work for these cretins. o Why not add "May I speak to your supervisor?" for no good reason... o "Just a sec., I'll get my wife, she's really interested in this sort of thing..." and leave the phone on the table for 10 minutes... o Blow him some nice tones. 1000 Hz is nice. o If it's a girl, start to BS with her. Ask her out. Even better, make like to you who she is, and your going to strange things to her body. 90% are ugly college chics, so you might not be able to hang up on one with this approach. Use your own judgement. o Turn the bell off on the phone, and hook up an answering machine, and sleep, sleep. :::: Ethics one should abide by :::: o Don't go after the lower echelons of the company by terrorizing the telemarketer. They have no effect on the company. All you do is ruin somebody else's night. With few exceptions, he is just as unhappy about bothering you as you are about being interrupted. o Lash back at the company, not the peon. He's paid to do that. 4 out of 5 people wouldn't do that unless they were paid. :::: REMEMBER :::: The organizing principal of modern society is, "The only people in contact with the public are the ones with no authority". Keeps we, the people, fighting with each other while leaving the Bosses free to play power games with lives. :::::::::::: Information written by The Sensei / TSR Editor ::::::::::: _______________________________________________________________________ _______________________________________________________________________ TELCOMMUNICATIONS EVENTS, TSR (c.c 2\28) CONFERENCES, SEMINARS, and SHOWS: This is a list of meetins and show in the up coming month. I'm providing this list for you and your friends to rob, cheat, and swindle the angered companies that participate in there events. You are likely to find your dreams come true in telephone accessories and other wonderful equipment. Many things will be on show, so take items as you please. There could be butt sets, testing equipment, and other stuff at your disposal. Remember, their parking lots are usually filled with BELL trucks, just waiting for you to clean them out. ________________________________________ Mar. 3-4 Exchange Carriers of Utah St. George, UT Holiday Inn Phone: 801-298-4242 Mar. 6-8 Voice '89 Santa Clara, CA Convention Center Phone: 713-974-6637 Mar. 6-10 MFOC '89 Washington, DC Hyatt Crystal City Phone: 800-323-1088 Mar. 7-9 REA Telecomm. Eng. & Mgmt. Seminar Minneapolis, MN Marriott City Center Phone: 202-382-8663 Mar. 8-15 Hannover Fair CeBit '89 Hannover, West Germany Hannover Fairgrounds Phone: 609-987-1202 Mar. 12-15 Minnesota Telephone Bloomington, MN Radisson South Hotel Phone: 612-291-7311 Mar. 13-16 Interface '89 New York City, NY Javits Conention Center Phone: 617-449-6600 Mar. 14-17 Carolina-Virginias Spring Mtg. Releigh, NC Marriot Hotel Phone: 919-592-5751 Mar. 15-16 InterCom '89 Miami, FL Hyatt Regency Hotel Phone: 305-446-5150 Mar. 19-22 South Carolina Telephone Charleston, SC Omni Hotel Phone: 803-722-4900 Mar. 19-22 Entelec '89 New Orleans, LA Louisiana Superdome Phone: 504-561-4530 Mar. 28-30 TBT West '89 Long Beach, CA Long Beach Convention Ctr. Phone: 800-243-6002 Mar. 29-Apr. 1 Communications Indonesia Jakarta, Indonesia Jakarta Fairgrounds Phone: 301-656-2942 Well all that's all for this month. For more, read up coming Reports! ::::::::::::::::::::::::: Seymour Lecker / TWA ::::::::::::::::::::::: _______________________________________________________________________ _______________________________________________________________________ SOFTWARE LINKS UNIX SYSTEM TO ATOMIC CLOCK: TSR (i.w 2\28) Precision Standard Time Inc. recently placed in the public domain software that synchronizes nodes on a Unix TCP/IP network to the atomic clock that U.S. Government uses to keep official time. On Unix networks, a number of time-sensitive applications require careful synchronization, both between network elements and in relation to an absolute time standard. Now inconsistencies need not occur. The software continually synchronizes nodes on a network to within 100 milliseconds on the atomic clock at the National Institute for Standards and Technology. US NO 202-653-0351. The software consists of University of Maryland's Time Demon, "ntpd," which implements the Network Time Protocol and synchronizes the host computer to Coordinated Universal Time, the international time standard. The software can be operated with or without a Time Source radio receiver sold by Precision ST. Without an external time standard, however, no provision exists to correct inaccuracies caused by the drift of computer calendar clocks or by errors introduced in manual clock setting. _______________________________________________________________________ _______________________________________________________________________ ::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES::::::::::::::::::::: // Callers Must be Told the Cost // The FCC yesterday ordered 5 companies that charge customers 20% to 80% more than AT&T, MCI or Sprint to toe the line. The alternative operators must now tell callers how much the call will cost and which company is placing it before it goes through. The high rates usually are placed on hotel, airport or hospital phones. :: UPDATE :: As stated above, alternative long-distance operators must: Put a sticker on the phone with price information or tell the caller the price verbally; give callers an chance to hang up without any charge; offer callers a chance to go through AT&T or another phone service. Right now many alternative operators stop you from using another carrier. _____________________________________________________________ // Bell Goes To College // Bell Atlanticom Systems said yesterday it has signed a contract with the College of William and Mary in Williamsburg, Va., for a fully integrated voice and data communications system. The campus-wide system will provide resale of communications services to students, a management system, and a universal wiring plan to provide voice and data transmission. The communications system obtained by the College of William and Mary yesterday will provide 300 trunks, 3,800 faculty and student lines, 150 voice/data faculty users and 1,050 host data ports. It includes more than 5,000 inside wiring runs and several miles of fiber optics. Also included: A 1,000- user Aspen Voice Mail System and the Alex-IS Telecommunications Management System. _____________________________________________________________ // Hackers Fail Raiding ATMs // TSR If authorities hadn't been tipped, a computer hackers could have cracked one cash-machine network of more than 14$ million over a single weekend, of Feb. 18. Charged in the plot were GTE Corp. consultant Mark Koenig, and 4 other hackers. Federal Agents said the hackers pulled the personal ATM codes from GTE telephone lines. The lines transmit transactions from account at Bank of America and thousands of other banks linked to the Plus System, a national network of shared ATMs. The Hackers put the data in magnetic strips on 5,500 pieces of card board. They planned to use the bogus cards to make withdrawals around the country. If it were not for a "TIPOFF", authorities wouldn't have known what hit them. [ Now this is a sad story. These -hackers- have a chance to break 14 MILLION in tax-free cash, and they blow it. I bet one of them bragged about it to a girl friend. That's the only way computer hackers get caught...they have to see some limelight. ] --TS ::::::::: Information provided by John "Scij" / 612 ::::::::: _____________________________________________________________ // Speaking of ATM Heists... // Recently, a crook used a Security Pacific National Bank ATM master card, which tapped into virtually all accounts. The heist resulted in a 237,000$ win for the hacker. The bank reimbursed depositors but still have not found the culprit. Alarmed by the incident, the American Bankers Assoc. plans to urge its 13,500 members to strictly limit access to ATM master cards and personal indentification codes. _______________________________________________________________________ _______________________________________________________________________ :::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::: "They [Hackers] have this need to find the answer." To subscribe to the 2600 Magazine send 15$ to: 2600 Magazine P.O. BOX 752 Middle Island N.Y. 11953 --Corley, Editor 2600 Magazine _______________________________________________________________________ _______________________________________________________________________ TSR will accept additional sponsor/support Systems. If you have a certain interest in the Report, and wish to provide support to TSR -- Leave your BBS number -- and any other information on RADIO WAVES Bulletin Board Systems. _______________________________________________________________________ _______________________________________________________________________ Pheonix Proj. LODH :: 512-441-3088 ----- Lunatic Labs :: 415-278-7421 At Login: Any UNIX Default PW P/H System Tiamats Temple Pvt :: 612-731-0296 ----- Hack Shack @ :: 214-422-4307 P/H-Files BBS Login: Any UNIX Default Pass RADIO WAVES System :: 612-471-0060 - Syndicate Report Support BBS - _______________________________________________________________________ _______________________________________________________________________ This concludes this Transmittal No. 21 (Part 2 of 2) Released March 2nd, 1989 by The Sensei Editor of The Syndicate Report _______________________________________________________________________ _______________________________________________________________________ -= EOF =-