_______________________________________________________________________ _______________________________________________________________________ THE SYNDICATE REPORT Information Transmittal No. 23 (Part 1 of 2) Released June 13, 1989 Featuring: Editor's Note Telecommunication Events, Conferences, Seminars, and Shows Phreak Tools V1.1 - Remake of CNA/L Lister Radio WTSP Hacker Charged With Computer Tampering The "950" Busts Hacker Stereotypes and Statistics Brief Notes from the Report "Drowning Hackers" Vocabulary Toni by The Sensei Editor Syndicate Report Magazine _______________________________________________________________________ _______________________________________________________________________ EXPOSITION: TSR Once again, The Report accepts outside sources. Anybody can write/provide information to The Syndicate Report. Articles/Information may be provided through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as Busts, Phreaking, Hacking, Data / Telecommunications, and new developments on any the previous mentioned specialties will be: accepted, labeled, and given full actual credit to the article/info provider(s), or writer(s). -- ** All articles have been presented by me unless shown at the end of the article as the information provider(s), or writer(s). ** _______________________________________________________________________ _______________________________________________________________________ EDITOR'S NOTE: TSR TSR #23, late as usual. Sorry, once again - life is testing me in many ways, that's why this issue is over a month late. This apology goes mainly to 'contributing writers,' for their help in this Report. Reasons: Like I said, I've been busy, and most of the information here is (unlikeusual) written by others. A lot of the info. is from locals, and users that call Radio Waves System, since I've not been calling the usual systems lately. I'm not going to go into a specific topic for my Editorial this issue, instead I'll just outline a few things of interest. Just a quick note: Abbie Hoffman, author of "Steal this Book" "Steal this Urine Test." and other books, is DEAD. I heard about it on the news a whileback, approx 1.5 months ago, but I didn't get all the specifics. From what I know he over dosed. Now he's a legend. PC Pursuit. The format change is complete, and all the old passwords are dead. June 1st was supposed to be the cut off date, I guess they finally did something on time. If anyone is still using the old format, it's probably the new format. I haven't heard too much information on the new format(s), butthere has been talk of 20 to 30 different formats used by PCP. Although new formats can be made swiftly and easily to accomodate any abuse. Good luck. The 4.6 trillion chance of hacking a PCP code is over, now it's justabout impossible. The only codes you will see now are the ones hackers have tapped from the "INSIDE of PCP." In TSR #23, Part II, I'm going to copy a letter I received from a guy in England. ;The Sensei / TSR Editor _______________________________________________________________________ _______________________________________________________________________ TELECOMMUNICATION EVENTS, TSR (c.c 6\9) CONFERENCES, SEMINARS, AND SHOWS: This is a list of meetings and shows in this coming month. I'm providing this list for you and your friends to rob, cheat, and swindle the angered companies that participate in their events. You are likely to find your dreams come true in telephone accessories and other wonderful equipment. Many thing will be on show, so take items as you please. There could be butt sets, testing equipment, and other things at your disposal. Remember, their parking lots are usually filled with BELL* trucks just waiting for you to clean them out. _____________________________________________________________ June 6-9 Payphone/Op Services Orlando, FL. Buena Vista Palace 713-974-6637 June 7-9 TEXPO '89 San Francisco, CA. Civic Auditorium 415-542-7753 June 11-13 Illinois Telephone Assn. Osage Beach, MO. Tan-Tar Resort 217-525-1044 June 11-14 ICC '89 Boston, MA. Sheraton Boston Hotel 617-466-3506 June 11-14 New York State Telephone Assoc. Lake Geroge, NY. 518-462-6696 June 11-14 ADUC 1989 National Conference Boston, MA. 800-228-9290 June 12-15 BICSI Workshop Lexington, NY. Radisson Plaza Hotel 606-257-3972 June 18-21 Pennsylvania TelephoneHershey, PA. Hershey Hotel 717-238-8311 June 18-21 Arkansas Tel Assoc. Hot Springs, AR. Lake Shore Sheridan 501-375-0086 June 18-22 NENA '89 Long Beach, CA. Hotel Queen Mary 213-596-0144 June 19-21 Videotex Industry Assoc. Ann. Conf. San Francisco, CA. 703-522-0883 June 19-22 NTCA Leadership Conf.San Francisco, CA. Fairmount Hotel 202-298-2300 June 19-23 Fiberoptic Splicing/Termination Sturbridge, MA. 508-347-7133 June 20-22 AFCEA Intl. Convention/ExpoWashington, DC. 703-631-6100 June 20-22 Maine Tel Assoc. Rockport, ME. The Samoset Resort 207-763-9911 June 20-22 UTC Orlando, FL. Buena Vista Palace 301-621-5596 June 24-28 Georgia Tel Assoc. Sandestin Beach, Fl. Sandestin Hilton 404-321-5440 June 26-28 Intelligent Network ConForum Chicago, IL. 312-938-3500 :::: Information provided by Seymour Lecker / TWA :::: _______________________________________________________________________ _______________________________________________________________________ PHREAK TOOLS V1.1 - REMAKE OF CNA/L LISTER: TSR (p.f 5\5) Ever get tired of looking up out-dated CNA listings in text files? Or did you ever wondered WHO own what prefix on an 1-800/900 exchange? If you have these problems, then check out PHREAK TOOLS V1.1, formerly called CNA/L Finder or Lister. Professor Falken, of Minnesota 612, has reformatted this CNA/L Lister, and renamed it to fit its style. Here's Falken's latest information about Phreak Tools: "It has a 800/900 WATS Exchange Reverse Directory and a built in CNAfinder in it. The 800/900 directory, all you do is tell it what exchange youneed and it will tell you who owns it, and from that you should be able to tell if it's a safe exchange. The CNA program is the same as the current stand-alone version, however, all new releases of Automated CNA Finder will be in Phreak Tools Versions 1.x+ New features to be in upcoming versions are newer CNA list, with ID codes. Area code/Country code finder, and a 950 port directory listing." (Sent via Radio Waves mail). The latest version has some hard to get information, and can be found onRadio Waves BBS at (612) 471-0060, and the 203 area. Currently, only IBM version 1.1 is available. There has been no further information from Falken, or Twisted Sector, 408 California, about an Apple version of Phreak Tools/CNA Lister. News about this in future TSRs, or on Radio Waves (RW/TSR) The Author will be taking suggestions, and questions on RW. :::: Information by Professor Falken / Phortune 500 / 612 :::: :::: Contributing Writer, Programmer of Phreak Tools :::: _______________________________________________________________________ _______________________________________________________________________ RADIO WTSP HACKER CHARGED WITH COMPUTER TAMPERING: TSR (5\11 ny.t) Michael I. Shapiro and Terry L. Cole, former news executives of WTSP,a Florida television station in the Tampa area, are charged with illegally entering the computer system of a rival television station.Christian Hoyer, an assistant state attorney in Hillsborough County, who is prosecuting the case, says that Shapiro, working for WTSP, Channel 10, had previously worked for a rival station, Channel 13. Shapiro is chargedwith using his own microcomputer and a microcomputer at Channel 10 to break into Channel 13's news computer, possibly seeking a competitive advantage for Channel 10's newscasts. The case is unusual because it involves 'media espionage.' :::: Information Provided by Romeo Andria :::: _______________________________________________________________________ _______________________________________________________________________ THE "950" BUSTS: TSR (usr 5\9) A bust recently went down, May 3rd, 1989. It's called "Beta Cygnus,"which is in the 602 area code, address 602-234-3376. The Sysop, Mastermind, did something very foolish to get caught. That's right, he was hacking 950-1001 and was caught. At the time of his arrest/capture the attorney general of Arizona had ordered a DNR on his line, consequently, a listing of all callsgoing to/from his board number were captured by the Feds. Mastermind's system and hardrive etc..was retrieved INTACT. Mastermind also kept all INFO-FORMS handy and un-censored. So if you wereon the board, and left some confidential information in the information form, the Feds have it now. Several other 602 boards went down due to the NEWS, Temple of Doom is down, and the HD is nuked. Valhalla Island did the same. * More busts are expected to come, since the attorney general made inferences to others. * :::: Information by Professor Falken / Phortune 500 / 612 :::: _______________________________________________________________________ _______________________________________________________________________ HACKER STEREOTYPES AND STATISTICS: TSR (5\19) Computer hackers have broken out of their old stereotypes. The information necessary to commit computer crime is spreading rapidly through the population as computers are becoming easier to access. According to a recent report published by the National Center for Computer Crime Data (NCCCD), 32 percent of the people arrested for computer crimes are women, 43 percent are minorities and 67 percent are between the ages of 21 and 35. Former and current employees are far more likely to breach a company's computer than someone from outside the company. Seventy percent of all computer crimes involve the theft of money or services. The NCCCD estimates that computer crimes cost the US $555 million in 1988. Also, 15 computer-years were lost in down time and 930 man-years were spent detecting and removing viruses. The arrest of computer criminals and the laws concerning them are examined. :::: Information by TS / TSR :::: _______________________________________________________________________ _______________________________________________________________________ :::::::::::::::::::: SYNDICATE REPORT BRIEF NOTES ::::::::::::::::::::: // Drowning Hackers // (3\0 d.log) Computer security is threatened by the nature of a computer's own configuration, especially stationary networks. Hackers have the advantage of surprise and a global entry capability. Several security measures are available to deter unauthorized entry into data files, although no computer is completely safe from intrusion. 'Drowning' is a method that hides important information within data that is actually garbage and not useful. Cost-benefit factors come into play when it takes more time to sort through files than the sought after information is worth to begin with. 'Traps' are programs that engage intruders in a dialogue while the system is being invaded. Meanwhile the hacker is being tracked down by the computer's security system. _____________________________________________________________ // FBI Haunted by West German Hackers // (3\0 d.log) Inattention in pursuing a widely publicized 1988 computer hacking case involving Marcus Hess is coming back to haunt the FBI, as West German authorities arrested Hess, along with several other hackers, for allegedly giving computer information to the Soviets. Hess had earlier been identified as being involved in the penetration of more than 30 computers at US research laboratories, military installations and defense contractors. US Air Force Office of Special Investigation assistant chief of computer crime, Jim Christy, says that the FBI has been embarrassed into more actively pursuing computer crime and that the Hess case is a catalyst that has engendered an understanding of the threat. _____________________________________________________________ // Hotel Motel Holiday Inn Services // (3\2 u.s.t) Telesphere International will implement for Concord Hotels of Cleveland its Telesphere Planned Hotel telecommunication services. With TPH, Telesphere will provide a package of services utilizing the company's all digital fiber optic network. Included: High volume WATS, switched access WATS, hotel flat rate service, international calling and 900 information service. Telesphere International will provide credit card and operator-assistedcalling from public pay phones and hotel lobby phones at Concord Hotels. Callaccounting systems will be used to manage call activity and monitor line usage.Under the agreement, Telesphere will provide its TPH services to 11 hotels with 1,400 rooms. The hotels are concentrated in the East but are expanding westward. :::: Information by The Curist / 615 :::: _____________________________________________________________ // Hacker Busted: Steals DEC VMS code // (2\2 m.wk) Twenty-five-year-old computer hacker Kevin David Mitnick is being held without bail on charges that include stealing $1 million in software from DEC, including VMS source code, and causing that firm $4 million in damages. Mitnick is also charged with unauthorized entry into the Leeds University campus. [ TS here. Just wondering, this guy appeared on several systems, including Radio Waves. He positioned himself as an official...guess we could have learned from him. If there is anymore information on this articles, send it in. ] _______________________________________________________________________ _______________________________________________________________________ ::::::::::::::::::::::: TSR Vocabulary Tonic :::::::::::::::::::::::::: What "Vocab. Tonic" is, is a list of acronyms and definitions to help education the ignorant hacker. With an extensive vocabulary, there is virtually nothing one can't learn. Study on... CO - Central Office: The building which comprises a switching network and its control and support equipment. (Trash House) FX - Foreign Exchange Line: A voice circuit between a remote CO, and a station. IOSA - Ignorant Operator Silent Approach: Form of phreaking, relating to Voice Mail Systems. From 3rd Party Fraud, Part II. ETS - Electronic Translation Systems: An electronic replacement for the card translator in 4A Xbar systems. Makes use of SPC 1A Processor. XBAR - Cross Bar: Old switching system. SF - Single Frequency: A signaling method for trunks. 2600 Hz is impressed upon idle trunks. _______________________________________________________________________ _______________________________________________________________________ :::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::::: "Against All Odds, There is Greatness" - TSR _______________________________________________________________________ _______________________________________________________________________ TSR will accept additional sponsor/support Systems. If you have a certain interest in the Report, and wish to provide support to TSR -- Leave your BBS number -- and any other information on RADIO WAVES Bulletin Board Systems. _______________________________________________________________________ _______________________________________________________________________ R A D I O W A V E S 6 1 2 - 4 7 1 - 0 0 6 0 Syndicate Report Support BBS _______________________________________________________________________ _______________________________________________________________________ This concludes this Transmittal No. 23 (Part 1 of 2) Released June 13th, 1989 by The Sensei Editor of The Syndicate Report _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ _______________________________________________________________________ THE SYNDICATE REPORT Information Transmittal No. 23 (Part 2 of 2) Released June 13, 1989 Featuring: Editor's Note "Hacker from England Letter" The CT2 Phone - Another Abuse Product Virus Outbreaks Spur Congree To Combat Threat How To Become A Syndicate Report Support BBS Credit Card Fraud: Old Techniques Still Work Brief Notes from the Report by The Sensei Editor Syndicate Report Magazine _______________________________________________________________________ _______________________________________________________________________ EXPOSITION: TSR Once again, The Report accepts outside sources. Anybody can write/provide information to The Syndicate Report. Articles/Information may be provided through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as Busts, Phreaking, Hacking, Data / Telecommunications, and new developments on any the previous mentioned specialties will be: accepted, labeled, and given full actual credit to the article/info provider(s), or writer(s). -- ** All articles have been presented by me unless shown at the end of the article as the information provider(s), or writer(s). ** _______________________________________________________________________ _______________________________________________________________________ EDITOR'S NOTE: TSR One day I went digging through some of my old letters in the file cabinet. A lot were from computer people -- this was all normal USPS Mail. One caught my eye. It was from a guy in England. I forgot I ever got it, and for good reason, it's post dated May 21, 1986. I found it interesting... _____________________________________________________________ My name John Doe and Address North Hull Estate HULL North Humerside ENGLAND Phone 0482 XXXXXX 21st May 86 Dear Sensei, Hello, as you can see, I live about 4200 miles away from you hence this letter, I'll try to keep it short. I know that you have, or had a C128 with a Volks 300-1200 modem, I have a Atmos 48k with D/D and a Voyager 11 modem, giving 1200/1200 and 300/300 baud. I am not 'on-line' at the moment, due to some technical problem with my cable, but when I am my password is 'xxxx'. Tell me now if you can, have you heard of a piece of equipment called a 'phreaker', there is a great lack of information 'over hear' regarding this machine, but apparently it aids you in your phone bills. With the limited knowledge available to me, I know your "Bell-Phone" system works on the 'two-phase' method, this would cause only slight problems in altering one or two of the part numbers. If you do know about this machine, I would be greatful to you if you could let me have details about its construction, part numbers each. Awair as I am that there will be some cost involved, I am quite prepared to respond with an agreed 'fee' for any and all information I can get. Should you be able to send this machine to me via air mail, or boat, this would prove expenceive from this end, and so I think a diagramm with part numbers, the best option. Anyway Sensei, I seem to be 'rabbiting' a bit, so I think I'll close now, iff youcan get some free time, would you simply 'drop me a line' to say that you have received my letter. Many thanks. Yours sincerely, John Doe _____________________________________________________________ Interesting, eh? When I first read this, I laughed. This guy thinks a 'phreaker' is a machine. I thought it was a person. Well, I tried to call the guy with the number, via MCI (love that service), and I got no answer. Back in '86 about this time, there was a lot of paranoia about busts. I thought this was some guy from England trying to find out about phreaking, thus do some busting or whatever. I never responded. Some of my readers are overseas, so if this person is reading this, write me again. I'm not sure how this person got all the information about me then. I did have a C128, with other computers. Maybe it was an overseas commie system. Who knows. These types of responses are rare -- via USPS. Usually it's all through networking/email etc. But I'm thinking about posting a READER'S RESPONSE COLLUMN in future TSRs. I do get many bits of information from the readers, so if I get a lot on a particular month -- I'll post more. Send those responses in! Via Radio Waves. The Sensei/TSR '89 _______________________________________________________________________ _______________________________________________________________________ THE CT2 PHONE - ANOTHER ABUSE PRODUCT: TSR (p.f 5/5) British Telecom, has made a cordless phone that's really portable. It's called the CT2 and weighs only 2.7 ounces. You bring it with you wherever you go, and when you are within reach of one of the base units popularly called " PhonePoints ", you can make calls. These PhonePoints/base units are permanently installed at popular locations such as airports, bus/train stations, shopping malls, and grocery stores. The CT2 is expected to cost about as much as a regular phortress phone call ($0.25), which makes it much more affordable than a cellular phone. The CT2's base unit has a range of 200 meters from its antennae. The technology is based on ISDN ( Integrated Services Digital Network ) instead of the current analog technology. The CT2 works in this matter, 1) Once you are in range of any of the CT2's base units (200 meters) you turn the phone to the TALK position. 2) At this time the telephone scans the 40 channels designated for it's use. The channels are in the 864 Mhz to 868 Mhz range, which is a step above the current Cellular frequencies (810 Mhz to 830 Mhz). 3) The phone sends out its owners billing information and authorization code etc. 4) The PhonePoint checks the users billing info and ID code with a central computer, and if everything matches up, you get a dialtone. :::: THE ABUSE :::: The process of scanning and locking onto the first available frequency is called FDMA ( frequency division multiple access ), British Telecom claims this " avoids the cross-talk interference " common in most cellular phones currently. The PhonePoint/CT2 system is to be deployed sometime within the next 2 years, for an approximate price of $275 per phone & access fees. At this time, it makes me wonder if they will encrypt the data going back & forth. If not, they could have major abuse to the system, just think what a person with a portable scanner could do? All he'd have to do is scan the 860 Mhz range and listen to peoples billing info and/or conversations, the information gathering possibilities are unlimited. :::: Information by Professor Falken / Phortune 500 / 612 :::: _______________________________________________________________________ _______________________________________________________________________ VIRUS OUTBREAKS SPUR CONGRESS TO COMBAT THREAT TSR (i.w. 6\9) Concerned by press reports and stung by its own outbreak, The U.S. Congress has begun talking about ways to combat computer viruses. FBI Director William Sessions warned last week that no current statutes specifically address viruses, particularly those where damage is limited to lost time instead of data and where the virus maker's motive is unclear. "Viruses are easy to create and propagate, require little expertise, and may by nearly impossible to prevent or detect," Sessions told the Senate on Technology and the Law. Sessions said the FBI is developing behavior profiles of computer hackers in an effort to combat viruses but noted that the FBI has only conducted two criminal investigations of viruses so far. [ TS here -- Only two cases? Damn, I thought the FBI was a little more informed about viruses than that! One almost pulls down an entire network, yet, no one on their staff can understand one completely. So, all you virus spreadors better get hopping before the law strikes back. ] Bill introduced is called the Computer Virus Eradication Act of 1989. By Wally Herger of Calif. The reason, according to Herger's press secretary Mahan, is three different House offices were infected by a virus through a computer bulletin board network shortly before an earlier version of Herger's bill was introduced in May 1988. If viruses persist, "out networks could be consumed by mutual suspicion," testified Clifford Stoll, a scientist at the Harvard-Smithsonian Center for Astrophysics in Cambridge, Mass. "Networks could become so bureaucratic no one could use them anymore," he said. "Cleaning up after viruses may be cheaper than preventing them." Stoll helped track down a West German hacker who broke into various unclassified military computer in this country. "Catching this spy took over a year of full-time effort," he said. "While he was reaching into out computer, I lost a year of astronomy research. Much worse, a thief was stealing information from out nation's computers." [ What, was he required to track this guy down for an entire year? I really feel sorry for him. He could have just asked some local BBS kids -- he would have gotten further, quicker. -TS ] _______________________________________________________________________ _______________________________________________________________________ HOW TO BECOME A SYNDICATE REPORT TSR (tsr 6\13) SUPPORT BULLETIN BOARD SYSTEM: At the end of each TSR Information Transmittal, you'll see a message something like... "TSR will accept additional sponsor/support Systems. If you have a certain interest in the Report, and wish to provide support to TSR -- Leave your BBS number -- and any other information on RADIO WAVES Bulletin Board Systems." Many users/sysops, after reading TSRs, ask, "How can I (or whomever) become a TSR Support BBS"? Well, knowing that not everyone reads every bit of data in a magazine, I'll write about in now. This article has a heading at the beginning of TSR and some substantial space, so people should understand now. Number one, if you like The Syndicate Report, you're already half way to having a TSR support system. When I look over possible TSR support BBSs, I look for what interests me in the BBS. It should favor certain hobbyists such as: hackers, phreaks, pirates, thrashers, etc. If you don't you might as well forget it -- since I probably won't call the system anyway to upload it regularly, nor anyone else. But, if you have those qualities with a good piece of software/hardware, then just leave your phone number and BBS name, and any login/new user info to me in feedback/mail on Radio Waves 612-471-0060. I'll reply back to you within a few days, no longer than a week. In that time, I'll probably be checking out your system. Most of the systems that do support TSR are ones that I've been calling for a while, and I've picked. What I usually require a BBS to have, is a transfer area dedicated to The Syndicate Report for easy up/downloading. Also, if there is an intense demand, a sub-board may erect. Usually sub-boards only appear on highly active hack orientated systems. So, if you wish to become a TSR support BBS, get a hold on me and leave any BBS information. Thank you for your support. ;The Sensei / TSR _______________________________________________________________________ _______________________________________________________________________ CREDIT CARD FRAUD; OLD TECHNIQUES STILL WORK: TSR (strs 6\13) Credit card fraud is doing very nicely, thank you. And, in some degree, that is a result of poor retail procedures and policies, says Limited Credit Services, Inc. and U.S. Secret Service agent Perry. One of the most serious internal fraud problems retailers are facing has not abated over the last several years. Or, as the SS puts it: "The Nigerians are still alive an well. I hate to keep beating up on them, but they're responsible, probably, for about 50% of everybody's fraud." The Assoc. of Credit Card Investigators' latest bulletin states: 'There are now an estimated 30k to 50k Nigerians in the U.S. and an estimated 75% to 90% of this group participates in fraudulent activity.' " The security asserts: "It is amazing they have changed their techniques very little and are still able to get away with it." They're getting away with it to a large extent by going into establishments as employees. Especially in the personnel departments -- that's where they want to work. They can get access to the information and they're off to the races. Employers assume they put these people into entry level jobs and they're not going to do anything. But they want entry level, low profile jobs, like a factory environment, almost. And a lot of credit card operations are like factory environments. One they're in, keying in payments, for example, they have the customer's back account number, where the checks are drawn. Most of the time there's a statement header that says what the person's credit line is, what the balance is. [ More Credit Card Technique Information in TSR #24. ] :::: Information by Credit Card Carny / 407 :::: _______________________________________________________________________ _______________________________________________________________________ ::::::::::::::::::::: SYNDICATE REPORT BRIEF NOTES :::::::::::::::::::: // Pizza Hut Uses Central Number // Telecommunications advances are helping Pizza Hut deliver pizzas faster. National Telecom's Automatic Call Distributor allows several shops in an area use a single number. Incoming calls are automatically routed to the shop nearest the caller's location. The system also features management information capability, helping store managers monitor service. If you have more information on this technology, dial Radio Waves now. _____________________________________________________________ // One in 10 to use fiber by 2001 // Telecommunications industry experts estimate that 10 percent of all American homes will be connected by fiber optics in the year 2001. A University of Southern California survey reported in Communications Week's current issue predicted 10 million Americans work from their homes in 2001 and would need the communications capability offered by fiber optics. :::: Information Provided by Celtic Phrost / 713 :::: _____________________________________________________________ // UK Law fails to snare Hackers // United Kingdom companies have no laws to protect them from unauthorized access to computer files. Existing laws refer to fraudulent tampering with programs. Proposals for new legislation from the Scottish and English Law Commissions are not expected to change the situation in the next two years. Two communications tappers who broke into the Duke of Edinburgh's mailbox on British Telecom's Prestel service have been fined 1,350 pounds sterling for electronic forgery. _______________________________________________________________________ _______________________________________________________________________ TSR will accept additional sponsor/support Systems. If you have a certain interest in the Report, and wish to provide support to TSR -- Leave your BBS number -- and any other information on RADIO WAVES Bulletin Board Systems. _______________________________________________________________________ _______________________________________________________________________ The Black Market :: 408-741-5443 ------- Lanatic Labs :: 415-278-7421 Login: Zeppelin New User: Bong P/H System Tiamat's Temple :: 612-731-0296 ------- Hysteria Prl :: 612-557-2811 P/H-Files Unix!Proline System RADIO WAVES System :: 612-471-0060 - Syndicate Report Support BBS - _______________________________________________________________________ _______________________________________________________________________ This concludes this Transmittal No. 23 (Part 2 of 2) Released June 13th, 1989 by The Sensei Editor of The Syndicate Report _______________________________________________________________________ _______________________________________________________________________ -= EOF =-