####################################### # # # # # ======== =\ = ====== # # == = \ = = # # == = \ = ====== # # == = \ = = # # == = \= ====== # # # # # # # # ''''''''''''''''''''' # # # # # # > Written by Dr. Hugo P. Tolmes < # # # # # ####################################### Issue Number: 04 Release Date: November 19, 1987 $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ TITLE: Cellular Technology FROM: US News & World Report DATE: May 18, 1987 The booming business in cellular phones has been a gift to eavedroppers too. About 700,000 of these new mobile telephones, high in quality and low in cost compared with the old-fashioned car phones, are already in use. But few users are aware that the first leg of the conversation-- from the car to the base stations that connect to the telephone network -- is carried on an ultrahigh-frequency radio channel that many radio scanners can tune in. According to Tandy corporation, which sells cellular phones, some 5 million scanners are already in the hands of the public, and most can be modified to recieve the cellular frequencies. Tandy's own Radio Shack stores sell a $399.95 scanner already equipped to pick up cellular channels. A law passed by Congress last fall makes it a misdemeanor to listen in on phone calls carried over microwaves or on cellular channels- but obviously such laws are almost unenforceable. The increased use of computers in business also has enhanced the possibilitiy of sophisticated snooping. Banks and other financial institutions authorize transfers of funds electronically, by transmitting computer-to computer messages over the phone lines. In one case, a technician in New York attached a tap recorder to an automatic teller machine he had been told to repair. As customers punched in their account numbers and indentification and directed their transactions, sending the data flowing to the bank's main computer, the recorder obediently taped all. The technician emptied several accounts before he was caught. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ NOTA: Just another article on the use of scanners to pick up cellular signals. The part at the end about the ATM repairman could possibly refer to Mr. Post (The Magician.) See TNS Issue #2 for more details. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ TITLE: Pirate BBS FROM: A+ Magazine DATE: November 1986 While several software publishers are removing copy protection, allowing users to copy application programs to their hard disks and keep an archival copy for backups, the Software Publishers Association is taking direct action to combat software theft. Through a private investigator, the group recently located and closed down a pirate bulletin-board system (BBS) called the Star Chamber, d made available more than 40 megabytes of Atari software, including a disassembled version of the Macintosh ROMs that allowed some Mac software to run on a modified Atari ST. BBSs and commercial information-retrieval systems such as GEnie, Delphi, CompuServe, and The Source provide an increasingly useful means for distributing information and ideas. The commercial services usually police their own systems. "The days are over when someone can illegally transmit copyrighted software via BBS systems", said Mark Skapinker of Batteries Included, one of the 12 publishers involved in the Star Chamber raid. The SPA will continue to monitor BBS systems and pursue individual piracy cases. "We're all fed up with tolerating theft of our products, and we intend to go after these scofflaws aggresively", added Gordon Monnier of Michtron, another publisher involved in the closing of the BBS. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ NOTA: It should be noted that the Star Chamber was back up soon after the BBS was raided. It just had more security. The Star Chamber may even be up still. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ TITLE: Scanning Bust FROM: The STC Telecomputing Network DATE: 1987 CHINA, Me. (NB) -- A 16-year-old computerist used his machine to dial every telephone number in his small town early one morning. And now he's doing time by doing computer work at the Kennebec County Sheriff's office. The boy will spend about 60 hours entering some 2,000 items of data that have backed up in the office. The sheriff said the youth programmed his computer to dial every number in the town of China. Then he fell asleep. When he awoke, he discovered that the computer had made 801 phone calls. When the sheriff got some irate calls from China citizens, he knew who to look for, because the youngster earlier used his computer and modem to make calls all over the country, leading to a $5,000 telephone bill for his mother. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ NOTA: The kid was scanning for computers in his prefix. He shouldn't have been scanning because he was busted for computer crimes earlier. Stupid kid. Of cours e this wouldn't have happened if he lived in a bigger town. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ TITLE: Rip Offs FROM: Time (Business Notes) DATE: May 25, 1987 Reach out and Rob Someone-"Pssst! Wanna buy a cheap long-distance phone call?" Words to that effect are now being whispered in the vicinity of telephone booths across the country as part of a scam that costs US phone companies anywhere from $6.5 million to $11 million a year. Hustlers who might once have peddled drugs or sex offer prospective customers cut-rate telephone calls that are placed by using access codes stolen from long-distance phone companies. The most likely buyers: people waiting in urban bus and train terminals, especially immigrants who mightved one in a foreign la nd without having to fork over a fistful of quarters. At New York City's Port Authority Bus Terminal, the going illegal rate is $2 to call anywhere in the US and $4 for an overseas hookup. Authorities have rounded up hundreds of phone hustlers around the country in recent months. In New York alone, last year 190 people were arrested for participating in the hot line scam. Three local telephone companies and 20 long-distance carriers, including AT&T, US Sprint and MCI, joined forces to form a group called the Communications Fraud Control Association, which now includes a number of other phone companies. The associations mission: to help crack down on the growing practice by urging tougher laws and stricter law enforcement. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ NOTA: This article gives the details on the forming of the CFCA (Communications Fraud Control Association). This association was formed from MANY LDC's (Long-Distance Companies). The alternate carriers are joining forces in an effort to stop phone fraud. Luckily, they are hitting hard on these "code hustlers" and that should bring some attention away from phreaks. These "code hustlers" have been found in most airports and bus terminals. Many times they are just homeless people who manually scan for working codes. Other times they are people who use their computers to hack them and then just make money by going around to airports an selling them. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ TITLE: How the Soviets are Bugging America FROM: Popular Mechanics DATE: April 1987 Soviet agents may be listening to your personal telephone conversations. If you're involved in the defense industry or in sensitive scientific activity, there is a good chance they are. In fact, a recent unclassified Senate Intelligence Committee report on counterintelligence indicates that more than half of all telephone calls in the United States made over any distance are vulnerable to interception. Every American should know this. In the ultimate phone tap, you place a call and the signal goes to a phone company microwave transmitter, which beams the call to a reciever. Some of the return signal "spills" allowing Soviets to pick it up. Signal is transmitted to a Russain satellite , which sends it to Cuba. Map shows Russian spy stations. When you place a long-distance telephone call from point A to point B, there are three communications paths or circuits, over which your call might travel:microwave, satellite, or cable. Cable is the most secure. However, it is the least practical and economical method. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ NOTA: This article actually went on for about four pages. Most of the article is Reaganish propaganda with anti-soviet themes. The part that was placed above is about the technical aspects of intercepting communications. When the transmissions are the Soviets can pick up the signals. Anyone could really pick up the signals. I hope that the small part that I printed above will be of some technical value. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ TITLE: Deadly Bugs FROM: The Chicago Tribune (Sunday Magazine) DATE: May 3, 1987 In 1971 a sophisticated scam was uncovered in South Korea involving a US Army supply computer. Through insider access, a group of South Korean blackmarketeers and US personnel had a lucrative racket going. By using the computer they were able to siphon off as much as $18 million dollars worth of US military supplies a year, and even resold the stolen items- somtimes back to the US Army- they manipulated computer files to conceal traces of the fraud. When this classic case of computer crime by insiders finally came to light, the moral seemed to be clear: software-the detailed instructions that tells a computer how to function and what operations to perform- is the ultimate medium for anyone wo for whatever purpose, seeks to engage in deception. Yet from that time to the present a sometimes-touching trust in computer software has become a hallmark of ever more of our nations's business and defense establishments, from banks transferring funds electronicaly to Strategic Defense Initiative [SDI]. In recent years Americans often have been entertained by stories of youthful "hackers" breaking into corporate or government computers and toying with the data or programs contained there. Amusement has sometimes turned into alarm, as it did in 1983 when some young people in Wisconsin penetrated part o a computer at the US government research center in LOS ALAMOS, NM. Or when, in July of 1985, New Jersey teenagers were found to have developed the capability through their home computers to alter orbits of commercial communications satellites. The forerunner of some members of this new generations may be "Captain Midnight", one of the first high-tech saboteurs to carryout an operation with dramatic nationwide impact. On April 27, 1986, Captain Midnight, as he called himself, interfered with a satellite transmission to Home Box Office viewers in the US, interrupting a movie to run his own message- and production widespread consternation in civilian and military circles. With some irony, the movie that Captain Midnight chose to interrupt was "the Falcon and the Snowman", which was based on one of the great US spy scandals of the 1970s. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ NOTA: What you have just read is only a part of the article. Most of the article centered on new SDI technology and government computer system. I selected the first few paragraphs and the second to last one about Captain Midnight. The article was about 6 pages long and had the following pictures: - a man sitting at a computer terminal with what appears to be an explosive device beneath the terminal -what appears to be a scorpion shaped like a computer Both of these pictuthe reader that hacking can cause deadly damage and that it should be wiped out. The first illustration wants to get over the idea that working at a computer can be deadly because of the software. The second illustration (that was actually on the cover of the Sunday Magazine) represents more danger ("Deadly Bugs") in computers. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ TITLE: The Newest Dating Game FROM: U.S. News & World Report DATE: June 8, 1987 "Hello? Any ladies out there?" asks 17-year-old Dan from Detroit. Over a crackling, echo-filled telephone line comes the voice of 14-year-old Michelle:"What color hair do you have?" Dan responds:"Br own, I have brown hair." About a minute later, Dan pops the question: "Do you want to call me? Here's my number....." Welcome to the weird world of hightech courtship. Dan and Michelle, like thousands of other teenagers and young adults, have dialed into the "party phone" lines that are now popping up across the country. For a toll ranging from 50 cents to $1 a minute, callers can talk to complete strangers, evaluate what they hear, then agree to continue talking through private telephone lines--or even to meet in person. The new services are enormously popular. Ultraphone of Seattle started party-phone lines in Omaha last year and now operates in more than 30 cities. Spitech, in Marlton, N.J., launched its service in Philadelphi a last year. It now operates in Pittsburge and Cincinnati, and is considering five other cities. "People are lonely and need somebody to talk to," says Ultraphone President Betsy Superfon. "With social diseases and rejection rampant, party phones are an alternative to the bars." KEEPING CONVERSATIONS CLEAN Along with the popularity has become controversy. Mountain Bell's part-phone service for teenagers and adults had "significant problems" from the start, says spokesman John Gonzales. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ NOTA: