💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › NSA › nsa01.phk captured on 2022-06-12 at 13:40:12.

View Raw

More Information

-=-=-=-=-=-=-

 
                     --=] National Security Anarchists [=-- 
                          --=] Volume 1, Issue 1 [=-- 
                       --=] Date Released: 06/21/91 [=-- 
 
 
 
                             == NSA Introduction == 
 
    Welcome to National Security Anarchists (NSA) first Newsletter.  We are 
  pretty much unlike other groups out there in that H/P wasteland.  We are more 
  interested in providing new ideas, and new information.  Now everyone can 
  scan, hack codes, hack unix.  Now in order to further these abilities we must 
  take a look at the new technology that most of you have overlooked.  From 
  just looking at these new ideas and concepts, you can develop you H/P skills 
  even more.  Now the release of NSA Newsletter will come out when damn ready 
  to.  Rush a newsletter, expect a shitty newsletter.  Plain and simple. 
  Enjoy. 
 
                               -- Your Editor -- 
 
------------------------------------------------------------------------------- 
Table of Contents 
 
 Section  Subjects 
-------- ----------------------------------------------------- 
   1.0    NSA Introduction 
   1.1    Table of Contents 
   1.2    Teleos Access Server, The Missing Switch? 
   1.3    Teleos Escort 
   1.4    Teleos Virtual Networking 
   1.5    Advanced Communication Architectures and Techniques 
   1.6    Network Facility Planning 
   1.7    NSA World News 
   1.8    Telco Briefs 
   1.9    NSA Information 
 
------------------------------------------------------------------------------- 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume 1, Issue 1 [=-- 
                               --=] Presents [=-- 
 
                == Teleos Access Server, The Missing Switch? == 
 
 
    The Access Server is Customer Premises Equipment (CPE) located in the 
  position formerly occupied by a T1 multiplexor.  The Access Server is a 
  switch that allows simultaneous Bandwidth-On-Demand access to each of the 23 
  64 Kbps B channels on the PRI interface. 
    The Teleos Access Server was designed to add value through switched access 
  to those emerging switched digital network services.  Specific interface 
  cards are then added to the Access Server for each type of access (premises 
  or netowrk) desired.  End users no longer need to provision T1 channels among 
  voice, data, image, and videoconferencing.  Currently, network interfaces are 
  available for T1 and PRI in all the protocol formats used by North American 
  Inter-Exchange and Local Exchange Carriers.  Premises-side interfaces are 
  availbable for T1, PRI, BRI, IBM token Ring and V.35 (through the Teleos 
  Escort PRI TA). 
 
    A Teleos Access Server will serve as the single point of switched digital 
  network access from teh store.  Older PBXs will be connected to the Access 
  Server via a Teleos T1 interface.  An IBM 3174 Controller and a workstation 
  will be attached to the Token Ring.  All access from the store with the 
  exception of local voice and local data calls will be via PRI. 
 
    CICS applications such as Inventory, Pricing, Payroll, etc. willl run on an 
  IBM Series 1 processor.  Both the Series 1 and the Token Ring will connect to 
  a modem sharing device for access to a 9.6 Kbps leased line for SDLC access 
  to an IBM 3090 host processor.  Credit card verifications for business 
  customers will be directed to the Series 1 which permits access to the host. 
 
    A key application driving the network architecture involes image transfer 
  technology, which could lead to the presentation of high resolution images to 
  the store's merchandiser to assist in selecting styles and colors of 
  merchandise to make available in their stores.  The images can reside on the 
  file server or the mainframe at the data center.  They are accessed using a 
  high-resolution PC workstation with a graphical user interface.  In trails 
  thus far, the call setup time through the IAP6000 Access Server hs been less 
  then two seconds. 
 
    The IAP6000 Access Server at the data center haso nly a Token Ring 
  interface on the premises side, and is connected on the network side over a 
  direct access PRI to MCI's DMS-250. 
 
    Teleos Communications has forecast that using switched digital services 
  rather than dedicated T1 network will save about 27% in recurring monthly 
  network operating charges for this netowrk. 
 
    Note: 
        Teleos, together with Network Software Associates (NSA), is pleased to 
      announce the availabbility of a PC-based 3270 emulation application. This 
      product is compatible with IBM's new 3174 Establishment Controller 
      equipped with the recently announced Basic Rate Interface (BRI) adapter. 
 
        When used with these new IBM products, the Teleos/NSA soution allows 
      ISA bus PCs to achieve 3270 terminal access and printer in an IBM S370 or 
      S390 environment via local or remote cluster controllers.  The product 
      solution consists of AdaptSNA 3270 Emulator software form NSA and Teleos' 
      B101PC Terminal Adapter. 
 
------------------------------------------------------------------------------- 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume 1, Issue 1 [=-- 
                               --=] Presents [=-- 
 
                              == Teleos Escort == 
                           == Switching Interface == 
 
    The Teleos Escort is a Primary Rate Interface Terminal Adapter (PRI TA) 
  that lets you leverage the power of the switched digital network by offering 
  access to a wide variety of high-speed switches services.  These include AT&T 
  ACCUNET Switched Digital Services (56,64,336,384, and 1536Kbps), MCI Vnet 
  Switched 56, and U.S. Sprint VP 56. 
 
    The Escort's unique Bandwith-On-Demand feature allows you to dial up 
  network bandwidth for applications on an "as needed" basis.  You pay only for 
  the bandwidth you use and access it only when you need it, resulting in a 
  reduction in overall transmission costs.  This feature makes the Escort 
  ideally suited for applications such as videoconferencing. 
 
    The Escort supports dual standard RS366 dialing interfaces that let you 
  access the direct dialing capabilities of video codecs.  The Escort also 
  provides an interface for serial, synchronous host communication via dual 
  V.35 or dual RS449/RS530.  Thus, by using the codec's keypad, you can easily 
  establish a videoconference with a remote video codec. 
 
    Escort options include an intergrated T1 Channel Service Unit (CSU), which 
  allows direct connection to the T1 line without additional external 
  equipment, and a Multi-Channel Synchronization feature, which provides the 
  capablity to bundle 56/64 Kbps channels into n X 64 increments 
 
    Simply put, the Escort allows you to link customers, suppliers, and 
  strategic partner over Switched Digital Networks with the flexibility and 
  cost efficiency of Bandwidth-On-Demand. 
 
------------------------------------------------------------------------------- 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume 1, Issue 1 [=-- 
                               --=] Presents [=-- 
 
                          == Teleos Virtual Networking == 
                     == Combining Private & Public Networks == 
 
 
    Teleos Access Servers give corporate end users the "best of both worlds": 
  Virtual Private Networks (VPNs) and Hybrid Private Networks (HPN).  These 
  networks deliver advance services over the more flexible and cost-effective 
  public switched digital network. 
 
    This emerging networking environment allows small and medium size 
  businesses, as well as large corporations, to leverage the full menu of 
  switched services for intra-and inter-enterprise networking applications. 
  Among the advance virtual networking features enabled by an IAP6000 Access 
  Server are multi-point.  Token Ring LAN bridging, distributed image 
  communications, video conferencing services, intra/inter-bulk file transfer, 
  and multi-vendor PBX interconnection. 
 
    For companies considering switched networking or phasing out cumbersome, 
  expensive private networks, the new features allow users to define a virtual 
  networking environment, mixing both public and private leased lines to 
  optimize network management resources, costs, and network traffic for more 
  competivite decisions-making based on information access, flow, and 
  distribution.  Virtual Networking offers the following advantages: 
 
 
    o Just-In-Time Bandwidth Optimization 
 
       Customers want dynamic bandwidth allocation on demand and want to pay 
       for it when they need it. "Just-In-Case" based private networks do not 
       offer this flexibility. 
 
    o Information Sharing 
       Virtual networking provides true information sharing with partners and 
       customers by enabling simple and flexible network topologies for either 
       vice, data networking, image, or videoconferencing. 
 
    o Unlimited Network Redundancy 
       Customers can use the built-in-redundancy of public Switched Digital 
       Networks eliminating the need for building backup routes as required by 
       proprietary private networks. 
 
    o Choice of Carriers 
       All major carriers offer Switched Digital Network services with an open 
       standard switched access (i.e., ISDN PRI) enabling a global networking 
       perspective for the first time. 
 
 
------------------------------------------------------------------------------- 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume 1, Issue 1 [=-- 
                               --=] Presents [=-- 
 
           == Advanced Communication Architectures and Techniques == 
                        == Advanced MSE Architectures == 
                             == GTE Project 534 == 
 
 
    This GTE Government Systems project has the broad, year 2000 objective 
  to develop an advanced military tactical communication system 
  architecture and software/hardware prototypes based on the most advanced 
  field-qualified technologies.  The first year of this multiyear project 
  effort was in the year 1990. 
 
    First, a set of preliminary operational requirements was put together. 
  The original objective for this project was for a MSE (mobile subscriber 
  equipment) replacement, using the most modern technology, suitable for 
  deployment in European terrain.  However, the most changes in the 
  world's geopolitical scence required a more general perspective. The 
  first operational requirements considered were the following: 
 
 
   @ Radio access only --- no wirelines required. 
 
   @ Moveability --- near-instantaneous take-down, set-up 
 
   @ Security, privacy. 
 
   @ Low probability of detection --- no radiation hotspots to reveal presence 
 
   @ Jamming resistant. 
 
   @ Ubiquitous low and medium band switching.  Selective broadband switching. 
 
   @ Interoperability with other communication systems 
 
   @ Survivability/reliability. 
 
   @ Minimal size and weight. 
 
   @ Position location. 
 
   @ Dialing by spoken name or unit or number. 
 
 
    A baseline architecture was conceived to meet these requirements. 
  This architecture has the following capabilities: 
 
   @ Phased array antennas permitting electronic variation of the 
     number of beams and their gains. 
 
   @ An all-radio interface using Spread Spectrum/Code Division 
     Multiple Access (SS/CDMA) for the line side and trunk side signals. 
 
   @ A single size Electronics Vehicle (EV) containing all system 
     eletronics; radio transceivers, antennas, and switches. 
 
    This architecture, in the principle, meets all the operational 
  requirements.  The universal SS/CDMA meets those requirements 
  relating to the radio interface.  The great mobility of this 
  architecture allows communication to begin as soon as the vehicle 
  stops.  The system self-configures, without prior planning.  The 
  Electronic Vehicle nodes (Look at diagram below) seek EV identifies 
  itself;  The mobile station's presence in the coverage zone of the 
  new EV automatically promulgates to all other system nodes; any 
  mobile station found can receive calls. 
 
    In 1991, further definition of this baseline architecture, the 
  consideration of different architectures, and the continuing 
  assessment of applicable technologies, will continue. 
 
 
 
                                                            __________ 
                                                   ____    /     *    \ 
                                 _________        /    \  /      ?     \ 
  (EV)  Electronic Vehicle      /         \       \     \/       ?      | 
                               /          /        \           >(EV)    \ 
  @     Personal Stations      \  *>>>    \        /*<      >>>>  ?      \ 
                               /    >>(EV)>>>      |  <    >      ?  >>* | 
 >,?,<  Radio Waves            \      ?   \ >>     |   <  >       ?  >   | 
                               /   *>>?   /  >>>>  |    <>        ? >   / 
                               \_________/      >>>>>>>(EV)>>>    ]   | 
                                                     \       >>>>(EV)  / 
                                                      \_____________  / 
                                                                    \/ 
 
------------------------------------------------------------------------------- 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume 1, Issue 1 [=-- 
                               --=] Presents [=-- 
 
                         == Network Facilities Planning == 
                               == GTE Project 446 == 
 
 
    The objective of this multiyear project is to develop advanced network 
  planning systems that will assist planners in producing cost-effective 
  facility expansion plans for the cellular networks used by GTE mobilnet 
  and the interoffice networks used by the telcos.  The project aims to 
  develop graphical, easy to use systems that employ state-of-the-art 
  optimization algorithms, allowing the planners to use them interactively 
  to evaluate several alternatives and generate cost-effective plans. 
 
    During 1990, the research effort focused mainly on developing a 
  facilities planning system for the cellular networks used by GTE 
  Mobilnet.  This system comprised optimization algorithms for determining 
  minimum-cost facility plans for the rapidly growing networks and 
  cost-effective network topologies that provide a desired level of 
  reliability.  The graphical interface for these algorithms is currently 
  being developed using X-windows/Motif presentation graphics and the Unix 
  operating system to ensure the portability of the tools to alternative 
  hardware platforms, and the future compatibility with other planning 
  systems. 
 
    A related task, that originated in response to a request from the GTE 
  Government Systems staff working on the Airfone ][ project, focused on 
  the design of the terrestrail facility network that connects the ground 
  stations to the Airfone switches. 
 
 
INTERCONNECT FACILITIES PLANNING SYSTEM FOR GTE MOBILNET 
 
    Mobile telephone services are expected to be one of the fastest 
  growing areas of telecommunications over the next decade, and this rapid 
  growth in the customer base will require a corresponding growth in the 
  network facilities.  A fundamental problem that arises in designing the 
  facilities network for a cellular system is to determine how to expand 
  the capacity of the facilities over a given planning time horizon to 
  meet projected demand at minimum cost.  The transmission facilities used 
  in the cellular systems are either privately owned (e.g. microwave) or 
  leased from the local telcos (T1s, fiber).  The capacity expansion plan 
  has to determine where and when to place concentrators in the network, 
  what type of concentrators to use, which cell sites to connect to each 
  of the hubs, which cells to connect directly to the Mobil Telephone 
  Switching Office, and what facilities to use on each of the links. 
  Optimizaion algorithms were developed to address these questions, and 
  the graphical interface for the system is currently under development. 
  In addition, preliminary work was completed on alogorithms to determine 
  the network topology that should be deployed to survive any single link 
  failure.  A prototype system was presented to the Mobilnet staff for 
  feedback and is currently under revision.  The transfer of the 
  alpha-version to Mobilnet is expected in the first half of 1991. 
 
    Figure Below illustrates the output of the prototype system.  This is 
  the final design toplolgy for a representative network; it shows where 
  the concentrators should be located and how the cell sites should be 
  connected to the hubs and to the Mobil Telephone Switching Office 
  located at Warrensville Heights, Ohio. 
 
 
 
         Final design topology for a representative cellular network 
        ------------------------------------------------------------- 
 
                                             o 
     o       o                           o_  |  /---o 
      \_    /  o                           \_|_/ 
        \__/_/                           _/- O_ Pine Ridge 
         _O/  Cleveland                _/   /  \_ 
       _/   \_                        o    /     o 
     _/       \_                          / 
   _/           \_                       /         o_      o   o 
  o               \_                    /            \_    |  / 
                    \_     o_  o       /               \_  | / 
        o             \_     \_ \     /                  \_|/ 
         \_______       \______\ \   /        /------------O Bainbridge 
                 \_             \ \ //--------             | 
       o-----------O---------------@/ Warrensville Heights | 
                 _/ Lakewood    _/ |\\-----\_              | 
               _/             _/   | \_      \             o 
             _/             _/     |   \-------O Chardon 
            o             _/       |        \_ 
                        _/         |          \_ 
                      _/           |   o        \_ 
                    _O Berea       |  /           \_        o 
                  _/               | /              \_      | 
                _/                 |/                 \_    o 
               /             o-----O Shaker Heights  o  \_  | 
             o                   _/ \_                \   \ | 
                               _/     o                \---_O_ South Russell 
                              /                          _/ | \_ 
                             o                         _/   o   \_ 
                                                      o           o 
 
  Key 
 ----------------------------- 
  @ - Main Switch Distributor 
  O - Inner Switch Distributor 
  o - Outer Switch Distributor 
 
 
FACILITIES PLANNING FOR THE TERRESTRIAL NETWORK FOR AIRFONE ][ 
 
    Due to the advent of new technology and the expected increase in 
  demand for air-to-ground telecommunications services, GTE Airfone is 
  currently considering the design and implementation of a new system, 
  called Airfone ][.  One of the questions that arises in the design of 
  the new system is, given the locations of the ground stations and their 
  busy-hour traffic forecast, where should switches that provide the 
  connection to the public-switches in order to minimize the overall cost 
  of the switches and the interconnect facilities. 
 
    To evaluate the impact of increasing the number of switches on the 
  cost of the interconnect facilities, this study considered five design 
  scenarios: 2, 4, 6, 8, and 10 switches, with one switch always fixed at 
  Chicago.  The study was carried out in two stages.  In the first stage, 
  a mathematical model was used to determine the optimum locations for the 
  switches, assuming that the ground stations would be connected directly 
  to the switches (i.e., a star topology).  Given a switch location and 
  the ground stations it will serve, the second stage determined a 
  minimun-cost topology to connect the ground stations to this swtich. 
  This topology allowed multiplexing and took advantage of the economies 
  of scale offered by the structure of the DS0 and DS1 tariffs and was 
  determined using a private network design tool, CAPT1N, developed at GTE 
  Laboratories during 1989 as part of Network Facilities Planning project. 
  The results of the second stage indicated the cost saving that result 
  from multiplexing for each cluster of switch and gorund stations to be 
  served by the switch.  The results of this study can now be used to 
  evaluate the tradeoff between the cost of the swithces and the cost of 
  the interconnect facilities to determine the number of switches that 
  should be placed in the network.  Figure below illustrates the network 
  topology with multiplexing for the four-switch scenario and the switch 
  at Chicago, transimiting to cells. 
 
 
          Minimum-cost network: Four-Switch scnario/Chicago as a Hub 
         ------------------------------------------------------------ 
 
                 o                     o_ 
                 |                       \_ 
                 |                         \_ 
                 |                           \_ 
                 |                             \_ 
                 |              o---------------o----------------------o 
                 |                            _/                       | 
                 |                          _/                         | 
                 |                        _/                           | 
                 |       o Minneapolis  _/                             | 
                 |     _/             _/                               | 
                 |   _/     Chicago  /         o Detroit               | 
                 | _/       _/-----@______      \                      o 
                 |/       _/    _//|\_    \------o                 Cleveland 
                 o-------/    _/ / |  \_ 
                            _/  |  |    \_ 
                          _/   _|  |_     \_ 
                        _/     |    |_      \_            Dayton 
        Kansas City    /       |     |_       \_            o 
             o       /         |_     |_        \_        _/   o Cincinatti 
              \_   /            o      |_         \_    _/   _/ 
                \/               \_     |_          \__/    / 
                o                  o     |_           o ---- 
                                St. Louis | 
                                          | 
                                          |  o Nashville 
                                          o-/ 
                                        _/ 
                                      _/ 
                                    _/ 
                                   o 
 
  Key 
 ----------------------------- 
  @ - Main Switch Distributor 
  o - Distribution Switches 
 
 
------------------------------------------------------------------------------- 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume 1, Issue 1 [=-- 
                               --=] Presents [=-- 
                              --=] World News [=-- 
 
    Welcome to NSA World News.  The next few articles tell of some of the more 
  recent Hack/Phreak and other activities as well.  I wish for you all to sit 
  back and have a few laughs on how the media portrays our society.  Funny, 
  hackers didn't get a bad name until, well until media got involved. Hmmmm, 
  makes you wonder doesn't it.  Read on. 
 
------------------------------------------------------------------------------- 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume 1, Issue 1 [=-- 
                               --=] Presents [=-- 
                              --=] World News [=-- 
 
                         "Nazi Video Games Circulating" 
                                   Written by 
                               Los Angeles Times 
 
 
     LOS ANGELES ---- Undergound computer-video games circulating among 
   Austrain and German students test the ability to manage a Nazi death 
   camp and to distinguish between Aryans and Jews, a Holocaust study 
   center says. 
     Eight copies of the programs, designed for home computers, were 
   obtained by the Simon Wiesenthal Center in Los Angeles.  The center 
   demonstrated two of the programs for The Associated Press on Monday. 
 
     Rabbi Abraham Cooper, the center's associate dean, said the 
   programs are based on the Holocaust but often substitute Turks, many 
   of whom work in Germany, for Jews. 
 
     In one program, "KZ Manager", the player must sell gold fillings, 
   lampshades and labor to earn enough money to buy gas and add gas 
   chambers to kill Turks at the Treblinka death camp.  "KZ" is an 
   abbreviation of the German word for con- centration camp. 
 
     The player must correctly answer questions about Turks or be taken 
   by a Grim Reaper figure to the Buchenwald death camp. 
 
     What yo uwant to do now if you love playing computer games, you 
   want to go right back in adn you want to win," Cooper said.  "It's a 
   very shrewd psychology in terms of the design of the game" 
 
     Reports of the games have circulated for several years, but they 
   were not believed to be widespread until a recent surge of reports in 
   the Austrian media, he said. 
 
     Newspapers reported that a poll of students in one Austrian city 
   said that nearly 40 percent knew of the games and more than 20 
   percent had seen them, Cooper said. 
 
     The game "Aryan Test" says it is by Adolf Hitler Software Ltd.  The 
   game "Anti-Turk Test" says it was made in Buchenwald by Hitler & Hess. 
 
     Distribution has been by electronic mail,  under-the-counter sales, word 
   of mouth and in deceptive packaging on store shelves.  Cooper said the 
   packaging of the "KZ Manager" game resembles "some sort of money game." 
 
     Cooper believes the games are the work of neo-Nazi propagandists (*** Yea 
   it's probably out own fucking gov't too ***) seeking youthful followers 
   through a technology largely unfamiliar to their parents. 
 
     "Not shocking to anybody, the kids are way ahead of the adults, and this 
   is one area where the Nazis, the fascists, have found a way in," he said. 
 
------------------------------------------------------------------------------- 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume 1, Issue 1 [=-- 
                               --=] Presents [=-- 
                              --=] World News [=-- 
 
                   "Nazi-Games Maker Target of Reward Offer" 
                                  Written by 
                               Associated Press 
 
 
     LOS ANGELES --- The Simon Wiesenthal Center offerd a $25,00 reward 
   Friday in hopes of finding the maker of neo-Nazi video games that 
   have been circulating in Europe.  It asked the German government to 
   match the sum. 
 
     "We believe that this would demonstrate a seriousness to finally 
   bringing these culprits to justice," said Rabbi Marvin Hier, dean of 
   the Los Angeles-based Holocaust research center.  The reward was 
   offered for information leading to a conviction. 
 
     The underground games, which are in German, have strong anti-Jewish 
   and anti-Turkish themes.  In one program, KZ Manager, the player must 
   sell gold filings, lampshades and labor to earn money to buy gas and 
   gas chambers to kill Turks at the Treblinka death camp.  "KZ" is an 
   abbreviation of the German word for concentration camp. 
 
     The reward was triggered by a telegram sent by German Chancellor 
   Helmut Kohl to Sen. Alfonse D'Amato, R-N.Y., on Thursday and 
   forwarded to the Wiesenthal Center. 
 
     D'Amato last week wrote to Kohl and Austrain President Kurt 
   Waldheim, asking them to prevent distribution of the games after the 
   center publicized their apparent spread in Germany, Austria, and the 
   Netherlands.  D'Amota's letters cited provisions of the Austrain and 
   German criminal codes that forbid inciting racial hatred. 
 
     Word of the games has circulated for several years, but reports in 
   the Austrain media indicate they are becoming more widespread, said 
   Rabbi Abraham Cooper, the center's associate dean. 
 
     In a translated copy of the telegram, Kohl told D'Amato that he is 
   disgusted by the games but indicated that the problem has already 
   passed. 
 
     "As far as can be ascertained, these products have not appeard 
   since early 1990," Kohl said.  "Before that, some of these evil items 
   had emerged, but they were not sold over the counter in normal 
   stores." 
 
     He said that the games were confiscated when found but that the 
   manufactuer has not been identified. 
 
-------------------------------------------------------------------------------- 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume 1, Issue 1 [=-- 
                               --=] Presents [=-- 
                              --=] World News [=-- 
 
                             "'Cracker' Speaks Out" 
                                  Written by: 
                                  UNIX Today! 
 
 
    New York--A man identifying himself as as one of the Dutch crackers 
    who was filmed breaking into U.S. computers by Dutch television said 
    last week he found the break-ins to be easy to do. He also said he 
    doesn't believe he did anything wrong. "A guest account is a guest 
    account.  I considered myself a guest on the system," said a man who 
    identified himself only as "Hank." Last Wednesday, Hank, who said he 
    was 24 years old, gave a telephone interview to Emmanuel Goldstein, 
    editor of the cracker journal 2600.  The interview aired on 
    Goldstein's radio program "Off the Hook," on WBAI-FM, a publicly 
    funded New York alternative radio station. 
 
      There was no conclusive evidence to indicate whether Hank was 
    genuine, though some details he gave matched those given out by 
    victims of the Dutch crackers and by people with contacts in the 
    cracker community.  Hank spoke English with a slight accent. 
 
      He would not discuss specifics of sites broken into, how he got in 
    or what he found once he was there. 
 
      Hank said the cracking is its own reward, and when he's logged 
    into a system, he's interested only in the system itself, not the 
    data on it.  One radio caller asked whether he'd ever gained access 
    to politicaly interesting information. "When i get onto a system, 
    I'm not interested in the stuff there," he said.  "I'm not 
    interested in going throught love letters or anything else." 
 
      He said if he had access to classified information---something 
    authorities say he did not have--it's the user's fault. "I think 
    it's pretty stupid to put classified data on a public network," he 
    said. 
 
      Hank said he believes computer laws will not control cracking. "I 
    think it's not a solution to prohibit hacking, because the people 
    will go underground," he said. 
 
      Hank said he has been cracking about three years, and specializes 
    in breaking into Unix systems. 
 
      At first, he contacted systems administrators of systems he 
    cracked to alert them to problems.  Some of them seemed to want to 
    use the information to correct the problem, but many seemed more 
    interested in hunting him down, he said.  And those were the ones 
    most likely to leave security holes uncorrected, he added. 
 
      He said he searched for default log-ins that were shipped with 
    systems by the manufacturer, and often not changed by users. 
    Goldstein would not comment on how he got in touch with Hank. "I run 
    a hacking publication, and there's one in Holland," he said. He said 
    he believes Hank to be authentic.  "Holland isn't that big a place. 
    Everybody knows what everybody else is doing. 
 
------------------------------------------------------------------------------- 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume 1, Issue 1 [=-- 
                               --=] Presents [=-- 
                            --=] Teleco Briefs [=-- 
 
    These are brief bits of Teleco information.  You may say so fucking what, 
  let's learn how to hack this and that.  Well go ahead and do that, you won't 
  get anywhere.  Well unless you take the time to realize the dangers that 
  Ma Bell is doing to stop us. 
 
------------------------------------------------------------------------------- 
 
                      ------------------------------------ 
                        Teleos Acquires Vadis Technology 
                      ------------------------------------ 
 
    Teleos Communicaitons, Inc., the leading manufacturer of PC-based terminal 
  adapters (PC TA) for ISDN connectivity, has purchased the technology of 
  Vadis, Inc. of Richardson, Texas.  The agreement includes a complete 
  technology transfer of Vadis' Microchannel PC TA architecture.  Teleos' own 
  PC TA product, the B101PC, is an IBM PC XT/AT-compatible adapter.  The 
  acquistion will stregthen Teleos' leading market position and will enable 
  Teleos to broaden its offerings in the low end ofthe PC TA marketplace. 
 
 
 
               -------------------------------------------------- 
                 ISDN Products to Reach Eastern European Market 
               -------------------------------------------------- 
 
    Teleos has appointed Internet its exclusive distributor in Hungary to 
  market the full line of Teleos ISDN customer premises equipment products in 
  that country.  Teleos intend to provide global corporate networking solutions 
  to multinational companies by leveraging the public switched environment, 
  such as ISDN.  In 1990, Teles demonstrated internation ISDN links with Japan 
  and France.  Internet is Teleos' first European distributor. 
 
 
 
                     ------------------------------------- 
                       Teleos Leasing Corporation Formed 
                     ------------------------------------- 
 
    Users of the emerging ISDN now have the opportunity to finance ISDN Access 
  Server Systems supplied yb Teleos Communications, Inc., through Teleos 
  leasing Cororation (TLC), a joint venture captive finace company recently 
  formed by Teleos and Communication Financial Corporation (CFC).  Teleos and 
  CFC are the sole shareholders of Teleos Leasing Corporation.  CFC will 
  provide funding and management services for TLC, which operates as a Teleos 
  affiliate and CFC subsidiary. 
 
------------------------------------------------------------------------------- 
 
                          National Security Anarchists 
                     "Plagurism is the Basis of Creativity" 
 
                                 ##  ## ###### ###### 
                                ### ## ##     ##  ## 
                               ###### ###### ###### 
                              ## ###     ## ##  ## 
                             ##  ## ###### ##  ## 
 
------------------------------------------------------------------------------- 
                          National Security Anarchists 
                     "Plagurism is the Basis of Creativity" 
                              All Rights Reserved 
        Any modifications to this text file is a violation of copyright 
                                  - (c) 1991 - 
-------------------------------------------------------------------------------- 
Downloaded From P-80 Systems 304-744-2253 
 
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+