Copy Link
Add to Bookmark
Report

Tolmes News Service 04

eZine's profile picture
Published in 
Tolmes News Service
 · 5 years ago

  

#######################################
# #
# #
# ======== =\ = ====== #
# == = \ = = #
# == = \ = ====== #
# == = \ = = #
# == = \= ====== #
# #
# #
# <Tolmes News Service> #
# ''''''''''''''''''''' #
# #
# #
# > Written by Dr. Hugo P. Tolmes < #
# #
# #
#######################################


Issue Number: 04
Release Date: November 19, 1987


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


TITLE: Cellular Technology
FROM: US News & World Report
DATE: May 18, 1987


The booming business in cellular phones has been a gift to eavedroppers too.
About 700,000 of these new mobile telephones, high in quality and low in
cost compared with the old-fashioned car phones, are already in use. But few
users are aware that the first leg of the conversation-- from the car to the
base stations that connect to the telephone network -- is carried on an
ultrahigh-frequency radio channel that many radio scanners can tune in.
According to Tandy corporation, which sells cellular phones, some 5 million
scanners are already in the hands of the public, and most can be modified
to recieve the cellular frequencies. Tandy's own Radio Shack stores sell a
$399.95 scanner already equipped to pick up cellular channels. A law
passed by Congress last fall makes it a misdemeanor to listen in on phone calls
carried over microwaves or on cellular channels- but obviously
such laws are almost unenforceable. The increased use of computers in
business also has enhanced the possibilitiy of sophisticated snooping.
Banks and other financial institutions authorize transfers of funds
electronically, by transmitting computer-to computer messages over the
phone lines. In one case, a technician in New York attached a tap recorder to
an automatic teller machine he had been told to repair. As customers
punched in their account numbers and indentification and directed their
transactions, sending the data flowing to the bank's main computer, the
recorder obediently taped all. The technician emptied several accounts
before he was caught.


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

NOTA:

Just another article on the use of scanners to pick up cellular signals.
The part at the end about the ATM repairman could possibly refer to Mr.
Post (The Magician.) See TNS Issue #2 for more details.



$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


TITLE: Pirate BBS
FROM: A+ Magazine
DATE: November 1986


While several software publishers are removing copy protection, allowing users
to copy application programs to their hard disks and keep an archival copy for
backups, the Software Publishers Association is taking direct action to combat
software theft. Through a private investigator, the group recently located and
closed down a pirate bulletin-board system (BBS) called the Star Chamber, d made
available more than 40 megabytes of Atari
software, including a disassembled version of the Macintosh ROMs that allowed
some Mac software to run on a modified Atari ST.
BBSs and commercial information-retrieval systems such as GEnie,
Delphi, CompuServe, and The Source provide an increasingly useful means for
distributing information and ideas. The commercial services usually police
their own systems. "The days are over when someone can illegally transmit
copyrighted software via BBS systems", said Mark Skapinker of Batteries
Included, one of the 12 publishers involved in the Star Chamber raid. The SPA
will continue to monitor BBS systems and pursue individual piracy cases.
"We're all fed up with tolerating theft of our products, and we intend to go
after these scofflaws aggresively", added Gordon Monnier of Michtron, another
publisher involved in the closing of the BBS.


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

NOTA:

It should be noted that the Star Chamber was back up soon after the
BBS was raided. It just had more security. The Star Chamber may even
be up still.



$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


TITLE: Scanning Bust
FROM: The STC Telecomputing Network
DATE: 1987


CHINA, Me. (NB) -- A 16-year-old computerist used his machine to
dial every telephone number in his small town early one morning.
And now he's doing time by doing computer work at the Kennebec
County Sheriff's office. The boy will spend about 60 hours
entering some 2,000 items of data that have backed up in the
office. The sheriff said the youth programmed his computer to
dial every number in the town of China. Then he fell asleep. When
he awoke, he discovered that the computer had made 801 phone
calls. When the sheriff got some irate calls from China citizens,
he knew who to look for, because the youngster earlier used his
computer and modem to make calls all over the country, leading to
a $5,000 telephone bill for his mother.


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

NOTA:

The kid was scanning for computers in his prefix. He shouldn't have been
scanning because he was busted for computer crimes earlier. Stupid kid. Of cours
e this wouldn't have happened if
he lived in a bigger town.



$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


TITLE: Rip Offs
FROM: Time (Business Notes)
DATE: May 25, 1987


Reach out and Rob Someone-"Pssst! Wanna buy a cheap long-distance phone
call?" Words to that effect are now being whispered in the vicinity of
telephone booths across the country as part of a scam that costs US phone
companies anywhere from $6.5 million to $11 million a year. Hustlers who might
once have peddled drugs or sex offer prospective customers cut-rate
telephone calls that are placed by using access codes stolen from
long-distance phone companies. The most likely buyers: people waiting in urban
bus and train terminals, especially immigrants who mightved one in a foreign la
nd without having to fork over a fistful of
quarters. At New York City's Port Authority Bus Terminal, the going
illegal rate is $2 to call anywhere in the US and $4 for an overseas hookup.
Authorities have rounded up hundreds of phone hustlers around the
country in recent months. In New York alone, last year 190 people
were arrested for participating in the hot line scam. Three local telephone
companies and 20 long-distance carriers, including AT&T, US Sprint and
MCI, joined forces to form a group called the Communications Fraud
Control Association, which now includes a number of other phone companies. The
associations mission: to help crack down on the growing practice by urging
tougher laws and stricter law enforcement.


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

NOTA:

This article gives the details on the forming of the CFCA (Communications
Fraud Control Association). This association was formed from MANY LDC's
(Long-Distance Companies). The alternate carriers are joining forces
in an effort to stop phone fraud. Luckily, they are hitting hard on these
"code hustlers" and that should bring some attention away from phreaks. These
"code hustlers" have been found in most airports and bus terminals. Many times
they are just homeless people who manually scan for working codes. Other
times they are people who use their computers to hack them and then just
make money by going around to airports an selling them.



$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

TITLE: How the Soviets are Bugging America
FROM: Popular Mechanics
DATE: April 1987


Soviet agents may be listening to your personal telephone conversations.
If you're involved in the defense industry or in sensitive scientific
activity, there is a good chance they are.
In fact, a recent unclassified Senate Intelligence Committee report on
counterintelligence indicates that more than half of all telephone calls in the
United States made over any distance are vulnerable to interception. Every
American should know this. In the ultimate phone tap, you place a
call and the signal goes to a phone company microwave transmitter, which
beams the call to a reciever. Some of the return signal "spills" allowing
Soviets to pick it up. Signal is transmitted to a Russain satellite ,
which sends it to Cuba. Map shows Russian spy stations.
When you place a long-distance
telephone call from point A to point B,
there are three communications paths or
circuits, over which your call might
travel:microwave, satellite, or cable.
Cable is the most secure. However,
it is the least practical and
economical method.


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

NOTA:

This article actually went on for about four pages. Most of the article is
Reaganish propaganda with anti-soviet themes. The part that was placed above
is about the technical aspects of intercepting communications. When the
transmissions are the Soviets can pick up the signals.
Anyone could really pick up the signals. I hope that the small part that
I printed above will be of some technical value.



$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


TITLE: Deadly Bugs
FROM: The Chicago Tribune (Sunday Magazine)
DATE: May 3, 1987


In 1971 a sophisticated scam was uncovered in South Korea involving a US
Army supply computer. Through insider access, a group of South Korean
blackmarketeers and US personnel had a lucrative racket going. By using the
computer they were able to siphon off as much as $18 million dollars worth of
US military supplies a year, and even resold the stolen items- somtimes back
to the US Army- they manipulated computer files to conceal traces of the
fraud. When this classic case of computer crime by insiders finally came
to light, the moral seemed to be clear: software-the detailed instructions that
tells a computer how to function and what operations to perform- is the
ultimate medium for anyone wo for whatever purpose, seeks to engage in
deception. Yet from that time to the present a sometimes-touching trust in
computer software has become a hallmark of ever more of our nations's business
and defense establishments, from banks transferring funds electronicaly to
Strategic Defense Initiative [SDI].
In recent years Americans often have been entertained by stories of
youthful "hackers" breaking into corporate or government computers and
toying with the data or programs contained there. Amusement has
sometimes turned into alarm, as it did in 1983 when some young people in
Wisconsin penetrated part o a computer at the US government research center in
LOS ALAMOS, NM. Or when, in July of 1985, New Jersey teenagers were found
to have developed the capability through their home computers to alter
orbits of commercial communications satellites.
The forerunner of some members of this new generations may be "Captain
Midnight", one of the first high-tech saboteurs to carryout an operation with
dramatic nationwide impact. On April 27, 1986, Captain Midnight, as he
called himself, interfered with a satellite transmission to Home Box
Office viewers in the US, interrupting a movie to run his own message- and
production widespread consternation in civilian and military circles. With
some irony, the movie that Captain Midnight chose to interrupt was "the
Falcon and the Snowman", which was based on one of the great US spy
scandals of the 1970s.


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

NOTA:

What you have just read is only a part of the article. Most of the article
centered on new SDI technology and government computer system. I selected
the first few paragraphs and the second to last one about Captain Midnight.
The article was about 6 pages long and had the following pictures:

- a man sitting at a computer terminal with what appears to be an explosive
device beneath the terminal

-what appears to be a scorpion shaped like a computer


Both of these pictuthe reader that hacking can cause
deadly damage and that it should be wiped out. The first illustration wants
to get over the idea that working at a computer can be deadly because of the
software. The second illustration (that was actually on the cover of the Sunday
Magazine) represents more danger ("Deadly Bugs") in computers.



$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


TITLE: The Newest Dating Game
FROM: U.S. News & World Report
DATE: June 8, 1987


"Hello? Any ladies out there?" asks 17-year-old Dan from Detroit. Over a
crackling, echo-filled telephone line comes the voice of 14-year-old
Michelle:"What color hair do you have?" Dan responds:"Br own, I have brown
hair." About a minute later, Dan pops the question: "Do you want to call me?
Here's my number....."
Welcome to the weird world of hightech courtship. Dan and Michelle, like
thousands of other teenagers and young adults, have dialed into the "party
phone" lines that are now popping up across the country. For a toll ranging
from 50 cents to $1 a minute, callers can talk to complete strangers, evaluate
what they hear, then agree to continue talking through private telephone
lines--or even to meet in person.
The new services are enormously popular. Ultraphone of Seattle started
party-phone lines in Omaha last year and now operates in more than 30 cities.
Spitech, in Marlton, N.J., launched its service in Philadelphi a last year. It
now operates in Pittsburge and Cincinnati, and is considering five other
cities. "People are lonely and need somebody to talk to," says Ultraphone
President Betsy Superfon. "With social diseases and rejection rampant, party
phones are an alternative to the bars."

KEEPING CONVERSATIONS CLEAN

Along with the popularity has become controversy. Mountain Bell's
part-phone service for teenagers and adults had "significant problems" from the
start, says spokesman John Gonzales.


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

NOTA:

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT