💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › NSA › nsa04.phk captured on 2022-06-12 at 13:40:19.

View Raw

More Information

-=-=-=-=-=-=-

 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume I, Issue IV [=-- 
                        --=] Date Released: 8/14/91 [=-- 
 
                              == NSA Editorial == 
 
 
  Welcome to National Security Anarchists Issue 4.  Yes we at NSA do admit this 
  Issue has taken some time since our previous releases.  Not to worry NSA is 
  still in existence and we shall continue always.  Why for the delay, Muds. 
  Trust me, Muds eats Hackers.  If you are planning to play muds, Rest assured 
  that you best say bye bye to your Hacking Career.  As I type this 
  Introduction, Dead Addict is blabbing "Dick Van Dyke, Starring Dick Van 
  Dyke".  And has raised an interesting question.  Why do these old shows have 
  separate beds for the Married Coupled.  And also these Married Couples have 
  Children?!? 
 
  Many of you have raised a point that is obvious.  We copy our material from 
  books/trash/manuals.  Yes we do and we always have admitted it.  Our Motto 
  states "Plagiarism is the Basis of Creativity".  Why do we copy straight from 
  the manuals/trash?  Simple!  The best source of Information is from the 
  Source. Here is a simple analogy to explain it even more.  Information is a 
  juicy Steak. And Most groups take this information and reword it.  Thus this 
  is Second Hand teaching, and plus you are learning what they learned. 
  Therefore that is in comparison to chewing up a steak and feeding you 
  tasteless bits.  Now we at NSA give you that Steak, unchewed, unprocessed, so 
  you to can enjoy that same flavor that we experience when examining this 
  material. 
 
  Also many of our readers have made several interesting ideas and comments for 
  the newsletter.  Now The Serious Side of Hacking is available in this 
  Newsletter.  What is The Serious Side of Hacking, well let I'll let Dead 
  Addict explain his section. 
 
  NSA has released SlimJim Version 1.0 into the Hack/Phreak world.  SlimJim is 
  a Unix Utility for MS/DOS machines.  SlimJim slims those large password files 
  and makes them smaller.  Plus SlimJim is very fast even on IBM XT compatible 
  computers, and saves you space at the same time.  SlimJim can be found on 
  various Hack/Phreak boards. 
 
  Soon Silicon Slave Version 2.0 will be released.  Yes, another Hack/Phreak 
  utility from NSA.  Silicon Slave is a collection of common Hack/Phreak 
  utilities incorporated into one program.  Details will be released later. 
 
                               ___Your Editor___ 
                                   Mind Rape 
 
------------------------------------------------------------------------------- 
Table of Contents 
 
 Section  Subjects 
-------- ------------------------------------------------------------------- 
   4.0    NSA Editorial 
   4.1    Table of Contents 
%  4.2    Anti-Pirate Video Techniques/GTE Project 358 
   4.3    The Challenge of the Industries                       <Submission> 
%  4.4    405MB Optical Line Terminating Multiplexer Glossary 
%  4.5    Human Speech Understanding/GTE Project 426 
   4.6    VMB Shuffle                                           <Submission> 
   4.7    Serious Side of Hacking 
   4.8    Info World 
   4.9    NSA Information 
 
% - If you are not an authorized USWest/GTE/AT&T/MCI/SPRINT/NEC Employee, you 
    are not permitted to read this information.  To do so, is a violation of 
    Federal Law.  Unauthorized reading/obtainment of the following documents 
    will result in Imprisonment & fines being issued. 
 
------------------------------------------------------------------------------- 
 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume I, Issue IV [=-- 
                               --=] Presents [=-- 
 
                       == Anti-Pirate Video Techniques == 
                             == GTE Project 358 == 
 
 
  Project 358 continued to explore video techniques in areas of copyright 
  protection, scrambling, and video storage.  Emphasis was placed on 
  development of hardware and software to demonstrate the feasibility of 
  network-based copyright protection.  Figure 358-1 depicts VCS functional 
  blocks.  The copyright protection scheme encrypts video material by 
  scrambling each vertical field and embedding program serial number, field 
  number, and error correction codes in one horizontal line of the vertical 
  blanking interval (VBI).  Public domain encryption techniques are used to 
  recover 15-bit pseudo-random descrambling codes.  Decryption requires the 
  keys(s) provided by a remote database, accessed through a low-speed 
  communication link (telephone network).  This allows viewing control and 
  revenue collection by intelligence in the remote database, but facilitates 
  copying and distribution of protected material. 
 
  The encryption scheme has two levels, one for protection of video 
  descrambling codes embedded in the VBI, and one for protection of messages 
  between the home and the remote database.  The encryption technique assumes 
  the potential pirate knows the encryption algorithm and demonstrates years of 
  work time to decrypt protected material without database-controlled keys. 
  The copyright protection scheme provides high-integrity protection of video 
  material until the key(s) is released, which provides security for live 
  broadcast and/or the recording and distribution phase of video cassettes. 
  While there are various schemes for protecting decrypted material from 
  copying during viewing, including locating the decryption function inside a 
  special TV or video monitor, none of the schemes provides significant 
  protection from the sophisticated pirate. 
 
 
                       --------------------------------- 
                               == Figure 358-1 == 
                          == Viewing Control System = 
                       --------------------------------- 
 
                                         Clocks Phase Locked 
  Analog Subsystem                               to 
                                            Hortzontal Rate        __________ 
  /--------------\----1.007 MHz Clk------------------------------>/          \ 
  |   GenLock    |----503.5 kHz Clk------------------------------>|  MC6859  | 
  | Video Timing |----2.014 Mhz Clk--->/-----------------\        |          | 
  |   Recovery   |----Vert Drive------>|                 |        |   Data   | 
  |--------------|----Hor Blanking---->|                 |PA7-PA0 | Security | 
  |              |                     |     MC68HC05    |------->|  Device  | 
  |     VBI      |                     |                 |PC7-PC0 |          | 
  |  Detection   |<------------------->|  Microcomputer  |------->|  (DES)   | 
  |  Insertion   |                     |      Unit       |        \__________/ 
  |______________|                     |                 | 
  |              |    PA7-PA0          |     (MCU)       | 
  | Descramble/  |<--------------------|                 |PA7-PA0/-----------\ 
  |  Scramble    |<--------------------|                 |<----->|    On     | 
  |              |    PB7-PB1          |                 |PB7-PB0|  Screen   | 
  \______________/     15-Bit          \_________________/------>|  Prompts  | 
    ^     ^       Descramble/Scramble        |     |             \___________/ 
    |     |             Control              |     | 
    |     |                                 \_/   \_/ 
   VCR    |                                RS-232 Port 
          | 
          TV 
 
 
  This project supports the implementation of a small field-deployable viewing 
  control-copyright protection system.  Results will be used as building blocks 
  to define a viewing control field demonstration for the Cerritos ][ testbed. 
 
  The past year has seen the development for VCS of MCU software that is 
modular 
  for flexibility during further development, yet does not exhaust the capacity 
  of the Motorola 6805 microcontroller and is able to operate within the bounds 
  of visual field time.  VCS processing in the microcontroller of the Home Unit 
  is now able to serve three levels of message encryption and apply up to five 
  scrambling keys to each video program.  It can also handle midtape video 
  start, viewing time control, and session cancellation.  Developments of 
  message overlays and application of "anti-pirate" copy signatures are now 
  under way and are scheduled for completion in the 1991's. 
 
  A significant effort during 1990 was the design and implementation of a 
  unique scheme for generating robust scrambling codes that preserve the 
  smoothness of the presentation.  The method is based upon encryption of 
  successive field numbers.  It produces scrambling codes that are uniformly 
  distributed and unpredictable, hence largely pirate-proof, yet can be easily 
  recovered by the system when videotape flaws prevent reading of field numbers 
  from the tape itself. 
 
  Six patents were filed on viewing control system techniques during the year. 
 
  Preliminary meeting were held with three studios, one TV manufacturer, and 
  one anti-taping technology company.  A presentation was also made to the T3 
  Standards Committee. 
 
  This project also supports activities relating to standards, including 
  attendance at T1Y1 and HDTV groups, as well as the EIA Multiport Receiver 
  Group.  A North American standard for compressing digitized video is under 
  active investigation by the T1Y1.1 Experts Group on DS3 TV.  GTE Laboratories 
  had increased activity in this field by attending the meetings held by the 
  Experts Group.  These meetings are usually attended by representatives of the 
  T1Q5.5 Experts Group who are concerned with performance standards for 
  digitized video transmission and represent the broadcasters and others. 
 
------------------------------------------------------------------------------- 
 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume I, Issue IV [=-- 
                               --=] Presents [=-- 
 
                     == The Challenge of the Industries == 
                             == Dennis C. Hayes == 
                    == Speech at BellCore's CPE WorkShop == 
 
                           == Contributing Writer == 
                               == Mobius Drux == 
 
 
  Below is a capture from HAYES, it is from the President of Hayes speaking on 
  the future of ISDN. Hey, folks this is the future so it would be to your 
  advantage to at least know whats going on. 
 
 "Waiting for ISDN to Happen..." 
 
  That phrase is a phrase that is seen often -- in magazines we read -- in 
  speeches we hear or in meetings we attend.   "When will ISDN happen?"  Our 
  market and product planning departments ask.  Our customers ask.   The 
  analysts and media make their predictions. 
 
  In the last two years, the magazine articles and speeches are changing: 
  something has happened.  In the last year people are now questioning 
 
 "WILL ISDN ever happen?" 
 
  As for the question,  "Will ISDN ever happen?", we all know the answer is 
  yes.  ISDN will happen and ISDN is happening.  The countries in North America 
  cannot afford to allow our communications services to be incompatible or 
  non-competitive with communications services used by our companies' and 
  America's global competitors.  ISDN is happening in Europe and is beginning 
  in Asia and our region of the world cannot afford to be left out.  ISDN must 
  happen in North America. 
 
  But there is a perception problem and the members of our computer and 
  telecommunications industries must solve the problems that still inhibit the 
  commercialization of ISDN. 
 
  If we were to graph the public interest in ISDN, we would see a "Spike of 
  Expectation" during 1986 - 1987 -- even into 1988.  People believed that ISDN 
  would make an impact on businesses and were excited about the possibilities 
  of using this technology.  But when the expectations were not met, 
  excitement was followed by a "Valley of Disappointment."  We must begin 
  building the excitement again -- but at a realistic level of steady growth -- 
  where the public interest matches the industry's capability.   A steady 
  growth of capability over the next year or two will rebuild confidence.  We 
  must provide concrete and tangible evidence of this steady growth of ISDN 
  deployment on an ongoing basis. Keep in mind the person who has to make the 
  decision to buy the service. What makes the MIS Manager or Telecommunications 
  Manager buy the service and products that implement ISDN?  What makes them 
  convince the CIO that ISDN is worth the investment? 
 
  The COS (Corporation for Open Systems) announcement about ISDN 1 has 
  rekindled public interest and is a step in the right direction, but we and 
  all of our colleagues in the industry must remove the real and perceived 
  barriers to successful commercialization. 
 
  Part of the problem that caused the "Valley of Disappointment" comes simply 
  from the concept of time in the computer industry being so different from the 
  concept of time in the telecommunications industry. 
 
  The computer industry:  predominantly data oriented -- and not regulated. 
  People expect computer technology to change rapidly and it usually does. 
  It is much easier for the computer industry to develop new products because 
  they do not face the barriers that the telecommunications industry faces. 
 
  Look at local area networking.  It took several years but it was fairly easy 
  for the computer industry to bring that technology into businesses.  LANs 
  were  market and technology-driven applications that faced no regulatory 
  barriers. 
 
  The telephone industry, on the other hand, is a much older industry that is 
  affected by a number of restraints which throttle change: compatibility with 
  the existing network and the federal and state regulatory barriers -- just to 
  name two. 
 
  The telephone industry's roots are with voice services to residential 
  customers even though data traffic is rapidly growing.   There is less 
  understanding of data services and very little understanding of the 
  integration of voice and data by most employees in North American telephone 
  companies. 
 
  So the two different cultures must meet.  And ISDN needs to bring the merger 
  of these two industries together very quickly.  ISDN is causing a tighter 
  coupling, tighter integration -- particularly with the integration of voice 
  and data -- making computers and telecommunications come together faster. 
 
  But as we all know -- there are barriers we face.  In March 1988, I gave a 
  speech for an ISDN User's Group here in Atlanta on "Removing the Barriers to 
  ISDN."  I am sure that many of you have heard or have made a similar speech: 
  All of us must work to overcome the barriers, from those in the industry who 
  provide the service and equipment to the customers who use the service and 
  buy the products.   It is our job to motivate the customers. 
 
  ISDN is being limited.  Limited by service availability, the regulatory 
  environment, tariffs, incompatibility between products, complexity of 
  provisioning and installation, and knowledge about deployment -- just to name 
  a few of the barriers.  Deployment plans and capital budget are crucial 
  elements that throttle the retooling of the telephone company workforce. 
 
  Service providers must rethink the way they develop and deploy technology. 
  If they want to play an increasing role in the rapidly growing data market, 
  the telephone companies will learn to think of central offices as  "data 
  centers." 
 
  CPE vendors must evaluate and revise the way they develop and provide 
  equipment to users,  as well as the way the applications get implemented to 
  use the service. 
 
  And as we begin to break down these barriers we must focus on our customers' 
  needs, keeping in mind the person who has to make the decision to buy the 
  service and equipment.  We must offer the service and products that make 
  communications more efficient and  cost effective,  and that give the user a 
  competitive advantage in his business. 
 
  But, how can we expect a customer to implement ISDN today?   We make it 
  difficult for the MIS Manager or Telecommunications Manager to buy the 
  service and our products.  An MIS Director cannot plan a nation-wide or 
  global network for their company because he cannot easily determine where 
  service is available now -- and more importantly when service will be 
  deployed during his planning horizon. And, there is no direct single place to 
  go to find the answer.  Very few user companies are US-based only.  And 
  certainly very few companies are based only in one service area.   So an MIS 
  Director is faced with going to a multitude of sources to collect data just 
  to evaluate if ISDN is a viable technology for an important application and 
  no one can tell him where to find all the needed information. 
 
  People in the communications business must communicate and share information. 
  With the two industries working together we can leverage our technical 
  expertise to benefit our customers. 
 
  ISDN is technically successful and working today even though improvements 
  will be made as standards evolve.  What is needed now is the ability for 
  cooperative competition to allow the successful commercialization in the 
  North American markets.  Customer needs can be met by cooperative behavior 
  between competitors which will remove real or perceived barriers that the 
  customer faces. 
 
  The Japanese understand cooperative competition.  Look at the development of 
  the VHS tape player.  The modem industry understands cooperative competition. 
  The development of CCITT V.42bis is an example of cooperative competition, 
  where companies worked together to offer the public the best technical 
  solution for compression in modems. 
 
  It is time to ask our legal departments how we can work together rather than 
  allowing them to say that we can't.  There are areas such as standards, 
  sharing information with customers, and removing the barriers where we can 
  legally work together without crossing the line into areas where we compete 
  for business. 
 
  ISDN commercialization takes a great deal of team work from all of us: 
  Service Providers; Switch Vendors; CPE Vendors; Applications Developers; 
  Resellers.  And, we must always be focusing on the end user and their needs. 
  Our goal as an industry should be to provide total customer satisfaction -- 
  which will mean offering a range of solutions. 
 
  Some of the visionary people in the two industries believe that fiber optics 
  and broadband ISDN are the future.  Basic Rate Access (BRA) and Primary Rate 
  Access (PRA) have their places.  BRA can offer a range of applications that 
  can create the desktop telecomputing environment that starts the shift from 
  the paper-based office to one that is electronically-based. 
 
  Today the Xerox copier and the fax machine support the paper-based office. 
  Basic Rate ISDN is the technology which can initiate a wide-area change in 
  multiple locations and to electronic-based communications. 
 
  Trends show that businesses are changing.    They need to be more competitive 
  in the global marketplace.  They require a shorter cycle time from decision 
  making to implementation and they can no longer act as a single unit.  A 
  business must work together with multiple enterprises. ISDN can be a major 
  catalyst that transforms businesses today and brings people into the 
  equation. 
 
  I believe that the integrated services and performance of ISDN will 
  fundamentally change the way people and businesses communicate.  ISDN is not 
  a faster modem.  It is not a "nicer" telephone.  It is not easier wide-area, 
  dial-up switched 56K digital circuit and packet communications. It is the 
  combination of these things offered economically, worldwide, that are the 
  ingredients for an "office revolution" and a new market for all of our 
  industries. 
 
  ISDN can fuel the transition to an electronically-based office. Things are 
  happening in the computer industry -- large screen workstations from 
  companies such as Sun, HP, DEC, Apple and IBM.  Applications like IBM Office 
  Vision, AT&T's Rhapsody, and Lotus Notes.   Workstations are no longer for 
  "data" processing -- they are for information processing and with the 
  integration of voice and data,  information processing can be brought to a 
  new level of interaction between the people who make decisions and take 
  action based on the information. 
 
  I am sure when the copier was first developed, no one imagined how businesses 
  would change -- with the ability of the printing press at their immediate 
  disposal.  We in the ISDN industry can just begin to think about what can 
  happen with true multimedia integration.  With voice and data integration, 
  people will be able to work on documents together -- no matter where they are 
  located. 
 
  Much of my company's focus has been on developing products that provide the 
  platform for good integration of voice and data --- not just products for 
  voice -- or products for data. 
 
  And, we realize the importance of applications developers, the people who 
  understand how work is done in an insurance company, a transportation 
  company, a retailer, or manufacturing company.  These are the people that 
  have to drive the implementation of applications for the end user and can 
  assist us in exploring the integration of voice and data. We need those 
  people who understand the way businesses work to develop the applications 
  needed by real users who don't yet know how multimedia integration can change 
  their ability to get work done. 
 
  We have developed PC adapters for the computer to work with the service and 
  we have focused on the program interfaces (the Hayes Standard AT Command Set 
  for ISDN and the Hayes ISDNBIOS).  These interfaces give applications 
  developers a platform to write their programs and provide the connection 
  between the CPE and the computer. 
 
  We strongly believe that it is the applications that will make customers want 
  to use any  service.   ISDN will be successfully implemented only when our 
  customers perceive it as faster and better, and offering improved price 
  performance and giving them some real advantage over their existing telecom 
  and datacom solutions.  ISDN must allow our customers to meet their needs of 
  today but also allow them to take a large step forward in doing difficult 
  tasks more easily.  ISDN must provide reasonably priced applications that are 
  not readily available today with alternative or bypass communications 
  solutions. 
 
  Our challenge is to bring our two industries together and to make ISDN 
  happen.  To remove the barriers.  Don't just create another spike of 
  expectation and excitement. 
 
  This afternoon the computer industry has an incredible opportunity  -- the 
  opportunity to work together with the telecommunications industry to make 
  ISDN happen.  For CPE vendors, applications developers, switch manufacturers 
  and telecommunications service providers to work together to launch a new 
  technology which will bring competitive advantage to our North American 
  customers, and fulfill user needs for easily accessed, integrated, efficient, 
  and cost effective integrated communications. 
 
  A simple concept:  customers and suppliers working together letting each 
  other know what they need to make something happen. 
 
  Bellcore has given both industries this workshop to begin the talks and to 
  open the lines of discussion between the two industries. And, going forward, 
  they will continue to play this role through their Resource Personnel. 
 
  Together the two industries can make ISDN a reality. 
 
  Just as we heard for six or seven years "This is the year of the LAN" 
  announced by our or another of the LAN company's CEO's, there were six or 
  seven years of the LAN leading to the success we see today. Today's  LAN is 
  an  important business tool. 
 
  If we grasp the opportunity Bellcore has given the industry here today on top 
  of all that is already being done throughout the industry, then surely we 
  will be able to look back and say 1991 was the first year we claim "This is 
  the year of ISDN." 
 
 _ _ _                          __ 
' ) ) )     /                  /  ) 
 / / / ____/___o  . . _       /  / __  . . _., 
/ ' (_(_) /_) <__(_/_/_) o o /__/_/ (_(_/_/ /\_ 
- 
A MD 20/20 production for the continued Pursuit of 
FREEDOM of COMPUTER INFORMATION (c) Copy-It-Right 
------------------------------- 
------------------------------------------------------------------------------- 
 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume I, Issue IV [=-- 
                               --=] Presents [=-- 
 
                == 405MB Optical Line Terminating Multiplexer == 
                                 == Glossary == 
 
 
  This section explains the basic terminology used for operation/maintenance of 
  the FD-39001A O-LTM.  This glossary also contains terms frequently used by 
  NEC/Other Companies in describing fiber-optic transmission systems.  Also 
  please use this Reference Guide for future issues dealing with Fiber Optics. 
 
 
  Terms                  Definition 
 ---------------------  ------------------------------------------------------- 
  1 x 1                  One standby circuit and one working circuit are 
                         provided; may be controlled by an external SWC or by 
                         devices internal to the O-LTM. 
 
  1 x N                  One standby circuit is provided for N working 
                         circuits; except for 1 x 1, requires an external SWC. 
 
  2 x N                  Two standby circuits are provided for N working 
                         circuits; the second standby circuit (LPC) can carry 
                         low-priority working traffic when not required for 
                         standby use; requires an external SWC. 
 
  45MB                   A DS3 signal at 44.736 Mb/s. 
 
  135MB                  A digital signal at 139.264 Mb/s. 
 
  405MB                  A digital signal at 417.792 Mb/s. 
 
  ACO                    Alarm cutoff; disables the local bell and/or lamp 
                         contacts as determined by strapping on the ALM. 
 
  AIS                    Alarm-indication signal; all-mark in the DS3 or SD 
                         channels inserted by the O-LTM when a failure has 
                         occurred in the TX (loss of frame synchronization or 
                         signal) which results in the loss of data; also 
                         applied when loopback disrupts. 
 
  ALM                    Alarm Module 
 
  ALM INF                Alarm interface module. 
 
  ALM OFF                Alarm off; resets local office bell and lamp contacts 
                         which are strapped for latching operation on the ALM. 
 
  APD                    Avalanche photodiode; used as an optical receiver 
 
  BER                    Bit-error rate 
 
  Bridging               Mode of operation selected at the external SWC to 
                         provide pilot signal to standby from system 2 (working 
                         1); provides signal to standby receive circuits to 
                         monitor quality of standby and detect failure 
                         (excessive BER, loss of synchronization) 
 
  Channel                A DS3 signal making up part of a higher-speed signal. 
 
  Channel Lockout        Setting a channel so that it is not switched to the 
                         standby circuit by automatic switching of the SWC; 
                         emergency override and forced switch can override the 
                         lockout. 
 
  Character              Eight scan points or commands used with E2A-APR serial 
                         supervisory systems; eight characters make up a scan 
                         display or command display 
 
  CH R                   DS3 channel receive module 
 
  CH S                   DS3 channel send module 
 
  Command Display        An array of 64 remote control functions (called 
                         command points) used with the E2A-APR serial 
                         supervisory interface; each array is arranged in an 
                         8-by-8 matrix; the supervisory system activates the 
                         controls via a command request specifying one command 
                         within the display; command points are logic one (1) 
                         when activated; command points are unipolar, requiring 
                         one command point to turn on a function and another 
                         point to turn it off; unactivated or unused 
                         (unassigned) command points are logic zero (0); the 
                         64th command point is always reserved for use by the 
                         supervisory system. 
 
  Command Point          A remote control function used in an E2A-APR serial 
                         supervisory system. 
 
  Command Request        Series of messages exchanged between an E2A-APR 
                         supervisory system and monitored equipment to activate 
                         a remote control command; the first message designates 
                         the command display containing the command; following 
                         echo of this message by the monitored equipment, the 
                         second message specifies the command within the 
                         display (one of 63 of the 64 command points in the 
                         command display); following echo of this message by 
                         the monitored equipment, the third message is an 
                         authenticator which causes activation of the command 
                         after echo of the third message; if any of the echoed 
                         messages are not identical, the exchange is invalid. 
 
  DET                    Detector module (optional) 
 
  135M DMUX              135MB demultiplexer module 
 
  405M DMUX              405MB demultiplexer module 
 
  Display                Alarm and remote control format used with Bell E2A-APR 
                         serial interface; see scan display and command 
                         display. 
 
  DS3                    A digital signal with a signaling rate of 44.736 mb/s 
                         and often referred to as 45MB. 
 
  DSX-3                  A cross-connect for DS3 signals. 
 
  E2A-APR                A serial input signal to a Bell-standardized Alarm 
                         Processing Remote (APR) and used by NEC to drive 
                         either Bell-standardized or NEC-proprietary 
                         supervisory equipment. 
 
  EEPROM                 Electrically erasable PROM which can be rewritten. 
 
  Emergency Override    Switching performed at the O-LTM to override the 
                         automatic protection switching; switches only the end 
                         at O-LTM; highest priority switching. 
 
  E/O CONV               Electrical-to-optical converter 
 
  FDF                    Fiber distribution frame; frame equipped with up to 
                         108 optical-fiber terminations for patching to optical 
                         transmission to rest equipment. 
 
  FDP                    Fiber distribution panel; panel for mounting in a 
                         frame and equipped with up to 16 optical-fiber 
                         terminations for patching to optical transmission or 
                         test equipment. 
 
  Forced Switching       Performed at the SWC to place one end of a circuit on 
                         or off the standby circuit; highest priority at the 
                         SWC but lower than emergency override at the O-LTM. 
 
  FOTS                   Fiber-optic transmission system 
 
  LD                     Laser diode; used as an optical transmitter 
 
  Local Loopback         Loopback originated at the local O-LTM and within the 
                         local O-LTM; provided at 134MB and 405MB in the 
                         FD-39001A (405MB) O-LTM. 
 
  Loopback               Testing and troubleshooting aid which causes a 
                         transmitted signal to be returned to the receiver in 
                         the same O-LTM; see local loopback and remote 
                         loopback. 
 
  LPB CONT               Loopback control module (optional) 
 
  LPC                    Lowt-priority channel; a protection crcuit (or 
                         circuits) also used to carry low-priority traffic 
                         which can be disrupted if the circuit is needed as a 
                         protection circuit to carry higher-priority traffic; 
                         the second protection circuit in 2 x N configurations. 
 
  L SW R                 LPC switching module (receive) 
 
  L SW S                 LPC switching module (send) 
 
  Manual Switching       Performed at the SWC to override the automatic 
                         switching to place a circuit on the standby; switches 
                         both ends of the circuit; lower priority than 
                         emergency override or forced switching. 
 
  Manual Preemption      Performed at the SWC to place a circuit on the 
  Switching              standby; switches both ends of the circuit; lowest 
                         priority; automatic switching can preempt the standby 
                         circuit. 
 
  Monitored Equipment    A device connected to an E2A-APR supervisory system 
                         and reporting alarm or status information to or 
                         receiving control signals from that supervisory 
                         system. 
 
  Muldem                 Multiplexer/demultiplexer 
 
  Multimode              Optical-fiber cable capable of transmitting light of 
                         more than one mode. 
 
  135M MUX               135MB multiplexer 
 
  405M MUX               405MB multiplexer 
 
  O/E CONV               Optical-to-electrical converter 
 
  O-LTM                  Optical Line-terminating multiplexer; line terminating 
                         equipment with multiplexing/demultiplexing 
capabilities 
                         as well as facilities to convert electrical signals to 
                         optical and vice versa. 
 
  Orderwire              Voice channel for nonrevenue communication between 
                         stations. 
 
  O-REP                  Optical repeater; regenerator for insertion in optical 
                         lines. 
 
  Parallel Interface     Discrete dry relay contacts provided to access 
                         supervisory equipment. 
 
  Pigtail                Optical-fiber cord containing a single optical fiber 
                         and used to terminate a multiple-fiber cable: one end 
                         is bare and is spliced to a longer cable; the other 
                         end is equipped with a connector to mount in the FDF 
                         or FDP or to connect to the O-LTM or o-REP. 
 
  Protection             A circuit used termporarily to carry traffic for a 
                         defective working circuit: a standby circuit. 
 
  PWR                    Power supply module 
 
  Remote Loopback        Loopback originated in one O-LTM and occurring from 
                         the transmitter in the originating O-LTM through the 
                         receiver and transmitter in another O-LTM through the 
                         receiver and transmitter in another O-LTM to the 
                         receiver in the originating O-LTM in the FD-390001A 
                         (405MB), standard at DS3 level and available with the 
                         optional LPB CONT module at 405MB line level; see 
                         repeater loopback, also. 
 
  Repeater Loopback      Remote loopback performed with repeater fault locator 
                         with optional LPB CONT and DET modules; remote O-LTM 
                         and O-REP can be accessed. 
 
  SC Lines               Switch control lines interconnecting SWC; usually 
                         carried on the overhead of the FOTS 
 
  Scan Display           An array of 64 alarms or status indications (called 
                         scan points) used with the E2A-APR serial supervisory 
                         interface; each array is arranged in an 8-by-8 matrix; 
                         each horizontal row of eight scan points constitutes a 
                         character; the supervisory system interrogates the 
                         monitored equipment via a scan request specifying one 
                         character within the display; scan points are logic 
                         one (1) when abnormal or in the alarm condition; 
                         normal or unused (unassigned) scan points are logic 
                         zero (0); the 64th scan point is always reserved for 
                         use by the supervisory system. 
 
  Scan Point             A status or alarm indication used with E2A-APR serial 
                         supervisory systems. 
 
  Scan Request           Series of messages exchanged between an E2A-APR 
                         supervisory system and monitored equipment to 
                         interrogate the monitored equipment; the first 
                         message designates the scan display and character 
                         containing the desired scan points; following receipt 
                         of the character from the monitored equipment, the 
                         request is repeated; the monitored equipment resends 
                         the character; if the resends are not identical, the 
                         exchange is invalid. 
 
  SD INF                 Service data interface module (optional) 
 
  SD Channels            Service data lines provided n the overhead of the 
                         FOTS; used to carry nonrevenue traffic such as SC 
                         lines, supervisory signals, and orderwire circuits. 
 
  Serial Interface       E2A-APR (RS-422) circuit complying with Bell CD #149, 
                         issue 2, and PUB 49001; used to access supervisory 
                         equipment manufactured by NEC or others 
 
  Single Mode            Optical fiber capable of transmitting only one mode of 
                         light. 
 
  Standby                A protection circuit 
 
  Supervisory            Surveillance equipment or system used to monitor and 
                         control a transmission network. 
 
  S SW R                 Standby switching module (receive) 
 
  S SW S                 Standby switching module (send) 
 
  SV                     Supervisory equipment or system 
 
  SW                     Switch modules; see L SW R, L SW S, S SW R, S SW S, W 
                         SW R, W SW S. 
 
  SWC                    A protection switch controller; an external device 
                         used to monitor O-LTM and control the switching of 
                         signals from working systems or channels to standby 
                         systems or channels; high-speed O-LTM usually perform 
                         the switching under control of the SWC; some O-LTM 
                         contain no switching and switching takes palce in the 
                         SWC. 
 
  SW INF                 Switch interface module       (1 x N and 2 x N) 
 
  SWP CONT               Switch panel control module   (working 1 x 1) 
 
  SWP INF                Switch panel interface module (standby 1 x 1) 
 
  System                 Digital signal consisting of combinations of 
                         lower-speed signals (usually DS3).  135MB (139.264 
                         Mb/s) equipment (FD-33001A, FD-33101A, FD-33102A) has 
                         three DS3 signals; 405MB (417.792 Mb/s) equipment 
                         (FD-390001A, FD-39101A, FD-39102A) has nine DS3 
                         signals. 
 
  UART                   Universal asynchronous receiver/transmitter; used to 
                         send or receive signals on a serial interface bus. 
 
  WDM                    Wavelength-division multiplexing; by sending two 
                         optical signals with different wavelengths, 
                         fiber-optic cable capacity can be doubled. WDM 
                         operation is either unidirectional in which both 
                         signals are transmitted in the same direction or 
                         bidirectional in which one signal is transmitted in 
                         one direction and the second is transmitted in the 
                         opposite direction. 
 
  Working                A circuit carrying revenue traffic 
 
  W SW R                 Working switching module (receive) 
  W SW S                 Working switching module (send) 
 
------------------------------------------------------------------------------- 
 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume I, Issue IV [=-- 
                               --=] Presents [=-- 
 
                        == Human Speech Understanding == 
                             == GTE Project 426 == 
 
 
  Research in Project 426 focused on areas of human speech understanding and 
  cognitive psychology that are critical to introducing automation in telephone 
  operations, and to designing effective human-computer interfaces.  In 
  addition, substantial support was provided to GTE Airfone, and research was 
  also directed at understanding how factors associated with wireless 
  communication (e.g., time delays, low-bit-rate speech coders, various channel 
  impairments) can influence conversations. 
 
  In 1990, Project 426 continued to support Project 533 (Application of 
  Automatic Speech Recognition to Telephone Operations) by providing 
  information on the characteristics of calls to Customer Service Order Centers 
  (CSOCs).  Project staff completed analysis of a large set of conversations 
  have been cataloged on a variety of dimensions.  Based on the information in 
  the database, a report was prepared on automating customer service contacts 
  by means of computer-based speech recognition.  In addition, work has started 
  on characterizing vocabulary in different types of conversations (e.g., 
  orders to install versus disconnect service) via automatic indexing and 
  cluster analysis. 
 
  To support detailed analysis of these recorded conversations, the VAX speech 
  editor was rewritten using a C++ style object-oriented user interface.  A 
  study to analyze the timing of question-answer sequences between CSOC 
  representatives and customers is now under way. 
 
  The long-term issues pertinent to the development of speech-based automated 
  systems were addressed in a paper presented at an international conference. 
  Topics discussed included methods for measuring the complexity of dialogue, 
  convergence (the process by which conversant adopt aspect of each others 
  speech), and the use of dialogue control acts (extra conversational steps 
  that ensure that the conversation proceeds smoothly). 
 
  Project staff also completed a report on an experiment performed in 1989 that 
  was designed to investigate the effects of attentional constraints on the 
  processing of natural and synthetic speech. 
 
  In 1990, work continued on evaluating conversations recorded under controlled 
  conditions that simulated one or more factors found in mobile 
  telecommunication systems.  A new test procedure designed in 1989 was 
  refined, and measurement techniques were developed.  Using this new 
procedure, 
  an experiment to investigate conversation dynamics over delay circuits with 
  600 and 1200 ms lags was completed.  Resolving the delay question is an 
  important first step in the project's investigations of conversation dynamics 
  in wireless channels because speech-compression techniques can introduce a 
  delay on the order of 150 ms (delays due to switching or transmission may add 
  significantly to this figure).  The project team is now in the process of 
  testing subjects in a second study that includes speech coder/bit error 
  conditions using the two-way ASET board developed by the Speech Technology 
  Group. 
 
  Work in support of the second-generation Airfone system focused on the design 
  and operation of Seatfone ][.  In 1990, project staff completed a series of 
  experiments and reports, including a study on user preference for membrane 
  keypads, a study of dialing performance using membrane keypads under 
  different feedback conditions (both auditory and visual), an assessment of a 
  new Seatfone handset, detailed comments and suggestions on a set of flow 
  charts intended to illustrate the call-sequence logic of Seatfone ][, and a 
  report on the quality of new speech prompts.  In addition, work has now 
  started on a comprehensive evaluation of the Seatfone ][ design using a 
  prototype developed by Airfone and ASIC Designs, and on the preparation of 
  detailed user-interface specifications. 
 
 
                     --=] National Security Anarchists [=-- 
                          --=] Volume I, Issue IV [=-- 
                               --=] Presents [=-- 
 
                               == VMB Shuffle == 
 
                           == Contributing Writer == 
                               == Mobius Drux == 
 
 
  This Phile is hopefully the first in a series of Philes on VMB's.  This is 
  also dedicated to Night Stalker (.aka. Flt 255 of (313) in memory of..) , and 
  all the fellows at NSA and Disconnected, including but not limited to those 
  who have helped, Dark Druid, I-Shence-Master, Mind Rape, A.O.D., Dead Addict 
  and Mommie Dearest. 
 
  I would like to add that all this information contained here within is not 
  intended to cause, direct or in any means relate to any illegal activities. I 
  can also say the following is true. 
 
  Title 18 of the United States Code, Section 1030, (Revised  1986) gives the 
  Secret Service, among other Federal law enforcement  agencies, the right to 
  investigate fraud and related activities in connection with "Federal-Interest 
  computers." 
 
  --------------------------------------------------------------------------- 
  - The above is true and the information below is for educational purposes - 
  -            only. Plus the information should be free to all!            - 
  =========================================================================== 
  8.8.91          VMB Number 1.00    A Info Series on 800.xxx.6245 MAIL Scans 
  =========================================================================== 
 
  The purpose of this Phile was to Scan the 800.xxx6245, where xxx is all the 
  possible prefixes. 6245 represents MAIL on DMTF fones. So I realized that 
many 
  people would take the time to check out this sub-prefix, 6245. I have done 
  all the initial information scanning and did not try to invade these systems. 
  I hope this information will help you to better understand VMB's. Heck if you 
  don't know what a VMB is you should do a little research. I believe LOL #10 
or 
  12 is on VMB's. I will however cover some basics. 
 
  VMB - stands for Voice Mail(Message) Box, this is a voice message system, 
        that allows messages, call transfers. ect. - Most work on a 3 or 4 
        digit mail box and an associated password to access that box. 
 
  The problem is alot of systems are getting security wacko and have Password, 
  then Box or 8 digit boxes and 8 digits Passwords combos. This phile is not 
  meant for you to hack these numbers but just as an informational source. As 
  an Anarchist or CyberPhreak you can appreciate the wealth of this 
  information. These Corporations generally do not take the time to listen. I 
  really doubt if they even use there VMB's, however if you have a gripe leave 
  a message to those concerned. 
 
 
    ======================================================================== 
    -------- Doing The VMB Shuffle or  How to spend a Summer Day ----------- 
    ------------------------------------------------------------------------ 
 
     [A] FH (Fuckin Hacker) 2.0  - Modifications and Setups that were used. 
 
         [1] Main Menu , Type D for Utilities 
         [2] Type A for Config Modem 
 
             Suggest putting ATL0 or ATL1 in your Modem Initialization string 
             to turn the speaker low. 
 
               [D] PBX Dialing - Turn to YES 
               [E] Outgoing Digit - Set to 1800 
               [I] Speaker - ON 
 
         [3] Go to the Target and Valid files and leave only one entry, you can 
             delete all the entries, it will leave one that is set at default 
             values. 
 
         [4] Go next to EDIT EXTENDERS 
 
             Remember this is a VMB run so you need no extenders, but will Add 
             new ones. Choose ADD. 
 
               [A] None leave blank 
               [B] None leave blank - The PBX option in the config modem takes 
                care of the outdial digits. 
               [C] Leave at Local 
 
               [D] Adjust to your board or leave as defaults. 
               [E] Adjust to your board or leave as defaults 
               [F] leave off 
               [G] Answer Delay - set to 0 
               [H] Target Delay - set to 35 or more 
               [I] 0 
               [J] Code First - YES 
               [K] Sequential - I use sequential so I can watch when the cycle 
                                ends and ESC back and flag ones that completed 
                                off or read just the scan to the next prefix 
                                series. 
 
               [L] Code Length - 7 
               [M] Code Template - ##abbbb  where ## is the Digit Cycle, a is 
                                   the change cycle and bbbb in this case was 
                                   6245. (Mail). I use a random scan search for 
                                   example I know that the first two digits of 
                                   a prefix cannot be 1 or 2 and the third 
                                   cannot be 0, so I set up my ADDs in a random 
                                   number sequence to cover the numbers from 2 
                                   to 9, ie. 8,2,9,5,7,3,6,4 so the first 
                                   template is 82X6245 then 22X6245 then 
                                   92X6245. The X is important since this is 
                                   what changes from scan to scan. FH doesn't 
                                   go in order and may hit an code sequence two 
                                   or three times so you may hit an prefix once 
                                   every 15 dials. 
 
               [N] Starting Code - ##abbbb where # is your starting number ie 
                   82, a is always 1 on the initial pass and increases, bbbb in 
                   this case is 6245. 
 
               All other values I leave at default, once I have added the 
               prefixes, I go to the extender flagging and flag them all. 
 
          [5] Flag Extenders - flag all your additions 
          [6] ESC and start HACKING from the main menu. I may add that I 
              created a batch file that would random hack and wait for 5 - 15 
              minutes both ways. Do not spend 8 hours or even more than 30 
              minutes Scanning even if you have alot of Ports, running. 
 
 
    ------------------ FH VMB Hints and Thins to Watch For. --------------- 
 
     [B] Pay Attention here. Alot of people miss these hints, they will 
         save you time and will even force you to listen durin scanning. 
 
         You hear a click before the ringing, this is 99% a invalid 
         prefix, prepare to hit the SpaceBar to skip this prefix. 
 
         You here a dial tone, hey this may be a PBX, let us know! If 
         you hear some DMFT tones then another ringing, this may be a 
         Diverter. 
 
         You get a message to leave a message, Hit * or # if it 
         continues wait for a double beep. This can be a diverter or a 
         backdoor into a PBX or you can just playback the messages or 
         other stuff. 
 
         You get a Carrier, fast hit spacebar record the number. In 
         the setup I have provided FH may error out because of no Code 
         File stated. Check the Carrier later. 
 
         VMBing works best at night, after business hours, since most 
         companies have operators during the day, and you will miss 
         and piss off people during the daytime. 
 
         Be careful of the MCI/US Sprint lines, they have Level D ANI 
         and see a display of who called. If they have CA (Call 
         Accounting) then they have a record of your number on a 
         printout (Sweep Finder). 
 
         Most Passwords can be the box number or an variation, 
         for boxes try either 999,9999,1000 or 1111 these are 
         generally the default Telco administrator boxes. 
 
  These are just a few notes...Now for the Good stuff. Remember, These 
  numbers are current as of 8.8.91 so they are fresh, don't burn them 
  out. If you do get a Slave going let me know. If there are any 
  additions or comments let me know. (See end of Phile to contact me) 
 
  ------------------------------------------------------------------------ 
 
     [C] 1.800.xxx6245 (MAIL) - VMB Scans and Associated Information 
                                *-Special 
 
      LD CO.  Prefix  Company         Other Information and Stuff 
      -----   ------  --------------  ------------------------------------ 
      AT&T    222     Paradata        Aspen,Dial 1 for Dir,4,4,#,box,# 
              234*    CARRIER         Pad x.25 
      DELTA   239     West Florida Communications 
      AT&T    243     BackStroke      2-leave mail,3-CC# (Dummies!), Meridian 
                                      Mail 
      AT&T    247     Audix system    password, # 
      LDS     256     ?               Dial Extension xfer 
      AT&T    262     Voice Mail      password,#,box * cancel 
      COM     266     Voice Message   #,box,# * 1 bad attempt 
              274     Phone Mail      *,box #,3,3 
      ITT     275     Digtagraph      *-dir,3-box 
      MID     279     Bren 1 & 2      1-data card voice, 2-aspen, call xfer 
      AT&T    322     US Leasing      #,box,logon Network Access, 
                                      Battery St. - 617+4dig, Front St - 7+4 
                                      dig 
      USS     326     Phone Mail      *,#,box, 2 attempt ops 
      AT&T    327     Meridian Mail   box,password,# 
      AT&T    332     First Fidelity  7dig ext,#,1-spell name,#-access 
      MCI     333     Phone Mail      last name, ext,#, 3 attempt ops 
      AT&T    344     Voice Mail      Enter ID 
      AT&T    346     Audio Info. Ex  *H-help,ID#,password,# 
      AT&T    348*    Quality Mail    *,wait 2 beeps,Enter Remote Access Code 
                                      ,#999 
              355     ATX Telecom     *,#,1,passfirst 
              365*    CARRIER         Pad ID:58 Port:4 
      USS     366     Unknown         4,# 
              373     Western Union/EasyLink 
              388     DET 
              395     Voice Mail      #,box,# 
      MCI     397*    900 Cust. Req.  (Backdoor), *-Enter PassCode 
      AT&T    426     Meridian Mail 
      AT&T    432     SeeBo Insur.Co 
      AT&T    433     Support Systems 4,4 #,* 
      AT&T    442     Voice Message Exchange 
      AT&T    446     Mark's Message  ID,#,4,4 
      AT&T    448     VGI             #,password 
      MCI     456*    CARRIER         Pad ID:DE Port 24 
      AT&T    457     Compuserve      message, * *, 2 beeps 
              487     Voice Mail      password,8digit 
      AT&T    522     AMD             *4-help,box,# 
      AT&T    525     Meridian Mail   box,# 
      AT&T    545     Unknown         ID # Please 
      AT&T    553     VMS 
      AT&T    624     Phone Mail      3,3,# 
      AT&T    626     US Tobakey      1-dir,#,* 
      AT&T    628**   E.L.Lilly       AT&T Voice Mail Systems, this is 
                                      the best VMB to call to find out 
                                      VMB information. 8 digit, #, 
                                      1-dir,2-mess,3-rec,4-changes,5-message 
                                      In 3) 5,5,tone,message,*,#,new 
                                      changes, **P=private,*M=options 
                                      @*6,**#=message 
                                      delivery,*R4=outgoing 
                                      message,main 
                                      menu,5,1=create,scan,modify. 
                                      GOOD VMB for AT&T VMB INFO! 
                                      Check this one out.GET IT! 
      AT&T    634     Alliance Health 4,4 
      AT&T    643     Coke Cola 
      AT&T    648     VMS 
      USS     669     Audio Info. Systems 
      MCI     674*    Calling Card    Bells!/MCI Op. Fon Booth Tymne 
              688     Jones Corp.     Press 1,2, * 3,3, error ops. 
      MCI     728     MCI Corp 
      AT&T    732     SeaLand         *=list,2-N.Jersey,3-|Metro,4-Info,3,3 
      MICR    741     Pan-American    1-message,2-leave msg,3-group,4-comments 
      AT&T    742     Digital Sound   # 
      EDSC    743     Meridian Mail 
              753     Unknown         4,4 
              755     Alex Brown      4,4 
              765     Bell Leasing 
      USS     767     Meridian Mail 
      SNET    771*    Market Response  -2 *'s fast or Ops pickup, 3 dig 
                                       Security Code 
              787     5 by 5          3,3 
              798     Phone Mail      # 
      USS     827     Phone Mail      # or name,3digit 
      AT&T    835     Meridian Mail 
      MCI     837     Vace Computers  1-xfer box,2-name,3-tech,5-phone mail, 
                                      #=search 
      AT&T    842     AngleHold       4,4 
      AT&T    845     Audix 
      AT&T    852     Hale&Dores      3,3 * 
      AT&T    874     Sounders Inc.   999,3,3 
              886     Unknown         Call nights 
              899     Unknown         Call nights 
      AT&T    922     Audix 
      AT&T    942     Mark's Digital  box,# 
      MCI     955     O'Brien Corp. 
      CBLE    966     Unknown password,#,box,*cancel 
      WEST    986*    CARRIER 
 
    ------------------------------------------------------------------------ 
 
     [D] Conclusion: Now doesn't that make life easier. Just remember two 
                     things. 1- When the going get weird, the weird turn pro, 
                     and 2- Today's weirdness is Tommorrow's reason why. If you 
                     have any questions or changes or additions or any 
                     information at all please contact me through: 
 
                       Disconnected @ 602.997.9918 
                       FES          @ 602.861.3167 - id : mdrux 
 
 
  Well, there's 70 VMB's for yah. These are just the .6245.'s believe me there 
  are a couple of hundred if not thousand more out there. If you get a slave 
  box, do us a favor...share your information. 
 
  This concludes the first in a series of VMB information. I hope in the future 
  to provide some more radical technical information..i.e. Interfacing VMB's 
  with PBX's and how it all works, Technical DoX on Major VMB's and maybe 
  develop a Scan Klub. Hope you have phun, but do remember if you have a Gripe 
  tell it to the President of the Company...LEAVE A MESSAGE IN THE VMB! 
 
 _ _ _                          __ 
' ) ) )     /                  /  ) 
 / / / ____/___o  . . _       /  / __  . . _., 
/ ' (_(_) /_) <__(_/_/_) o o /__/_/ (_(_/_/ /\_ 
 
A MD 20/20 production for the continued Pursuit of 
FREEDOM of COMPUTER INFORMATION (c) Copy-It-Right 
 
------------------------------------------------------------------------------- 
 
 
                     --=] National Security Anarchists [=-- 
                         --=] Volume I, Issue IV [=-- 
                               --=] Presents [=-- 
 
                     --=] The Serious Side of Hacking [=-- 
           --=] Literature, Poetry, Humor, Sarcasm, Hacking, Sex [=-- 
 
 
  That is what The Serious Side of Hacking is all about.  Poetic hackers are 
  perhaps one of the most neglected minorities in the country.  Looking on a 
  list of possible scholarships, I see "Homosexual, Blind, Black Agraphobes", 
  but no poetic hacker. Lets face it, society just ignores us.  Fellow hackers 
  just ignore us.  No more.  Now we have an entire dedicated section in the 
  most prestigious hacking newsletter (that has my name on it) ever produced. 
  Now, why me, why not our capable editor Mind Rape?  Very good question...  I 
  was going to let him write this section...  Then I heard some of his poetry. 
  I handle this section now.  (offence intended, Mind Rape).  However, this is 
  not only a poets forum, we also support many other neglected hacker topics. 
  What topics you say?  Lotsa topics....  Previously unreleased boxes, cool 
  anarchy techniques, and much, much, more. 
 
  Mind Rape wanted to call this area "Hacker Sarcasm".  I said "ikes, that 
  sucks, Mind Rape".  But we tried to keep a humoristic view about it, and 
  hopefully there will be a pinch of humor in all of this writing. 
  Where to complain if you do not like any of this: fuck you, go to hell, 
  lemme see you do better, you uncreative, unapreciative louse. (wow, that's 
  pretty cool word too - "louse") 
 
  Unclaimers, Reclaimers, Disclaimers, Recliners - I hereby claim every hacking 
  technique ever to be discussed here WORKS.  I don't know what the word 
  RECLAIMERs means.  The only DISCLAIMER this section has is that we take no 
  responsibility for the MANY crimes we hope to encourage you, and your friends 
  to commit.  RECLINERS, great to laze around in. 
 
  Ok, kids, that looks like about it for now....  enjoy the TSSOH articles 
  contained herein (wow, what a cool word!), and Mind Rape, I sure hope to hell 
  you don't want me to write an introduction EVERY issue.  (see definition of 
  RECLINER for my reasons for this request). 
 
                                - Dead Addict - 
 
------------------------------------------------------------------------------- 
 
 
                     --=] National Security Anarchists [=-- 
                         --=] Volume I, Issue IV [=-- 
                               --=] Presents [=-- 
 
                     --=] The Serious Side of Hacking [=-- 
                            == The INVISIBLE Box == 
            ==The first in a series of previously unreleased boxes== 
 
                                An Introduction 
 
  A friend of mine who is both an electrician and a phone technician has had no 
  contact with the computer underground, and yet has managed to design and 
  produce several incredible boxes that never have been released.  This dear 
  soul was kind enough to take me under his wing and show me some of his 
  incredible inventions.  Luckily for all of us he was not only interested in 
  saving some money (he too abhors the idea of paying for ANY phone call), but 
  had a healthy interest in anarchy as well.  The INVISIBLE box I am about to 
  describe is SO incredible it makes the blotto box look like the DONUTHIN box 
  (to be released at a later time in this series). 
 
 
  DISCLAIMER: Important! This file was DESIGNED to ENCOURAGE others to break 
              laws, commit anarchy, and create havoc.  If you have NO intention 
              of doing all of the above please do NOT read this.  I however 
              will take NO responsibility for the MANY laws I hope I to 
              encourage you to break. 
 
 
  USAGE: 
 
    Essentially this is an improved blotto box.  But the blotto box, as we know 
    was bullshit, this WORKS! (I have, um, er, friends that have told me so, I 
    would NEVER break any laws myself).  Through the use of the RS232 port on 
    your 50mhz IBM compatible we will show you how to destroy ANY, I repeat ANY 
    area code you wish to destroy.  I know this sounds incredulous but there is 
    an essential flaw in the surge protect system that is installed around the 
    country. (This system is the reason that the blotto box did not work and 
    was bullshit).  One of the incredible features that this box has is that it 
    is IMPOSSIBLE to trace with existing current technology. 
 
 
WHAT MAKES THIS BOX POSSIBLE: 
 
  The flaw with the infamous blotto box is that it tried to instantly fry the 
  area code (another flaw is that it tried to kill the area code that you were 
  IN).  The INVISIBLE box slowly builds up voltage in the remote target until 
  the required voltage is established, then discharches just enough voltage to 
  create a spike to demolish an area code. 
 
 
MATERIALS NEEDED: 
 
  Honda Generator: 
             Note: (hey, WOW, they DID get SOMETHING right on that blotto 
                   bullshit) 
    How to obtain: Rent (this costs a bit, so stay with me) 
                   Steal! (preferred method) 
 
  486 50mhz IBM Compatible: Why all this power?  One of the reasons that this 
                            has not been done before is that there is not 
                            enough speed to properly kill off area codes with a 
                            wimply 486 25mhz, so we have to use a 50mhz 
                            machine. 
             How to obtain: Again, NSA STRONGLY recommends that you steal one 
                            of these. (the chair-through-the-window-technique 
                            is suggested). 
 
 
                             !!!MOST IMPORTANT!!!! 
 
                  The National Security Anarchists Release Of 
       "Area Sucking, Smashing Heroific Osculator: Lancaster Engineered" 
 
  I know the title is a bit of a mouthful, but the writer of the program (my 
  friend I was telling you about) insisted, so NSA finally gave in, and 
  released it under that name. This program has already been released to the 
  general public, and can be found on ANY worthwhile H/P/A/C/V/K/W board in the 
  country. 
 
  The interface between the components has been explained in detail with the 
  docs to that accompany the program. (we tried to think of an acronym for the 
  program, but were at a loss). 
 
  Well I guess thats pretty much it.  I would explain how to use the program, 
  but it is SO painfully obvious once you load it in, I would feel like an 
  idiot spending precious disk space explaining it here. 
 
  NOTES: I would like to thank my friend (Lancaster) for thoughtfully 
         engineering this, and taking the time and energy to write the program 
         (he spent four LONG months doing so).  I would also like to announce 
         with pride that this program is now Windows compatible, and soon will 
         be released for various other systems depending on the hardware that 
         is currently available on some systems.  Thank you, and happy area 
         code killing. 
 
 
                       Distribution Sites that Carry the: 
    Area Sucking, Smashing Heroific Osculator Software Lancaster Engineered 
 
            Bulletin Board            Phone Number   New User Password 
          +-----------------------+-----------------+-----------------+ 
          | Homosexual Smurfs     | D-(ONT)YOU-WISH |  Sodomy         | 
          | Bellcore Headquarters | 1-(619)PRI-VATE |  Primusnet      | 
          | Urkantus Recantictus  | 1-(808)PRI-VATE |  Password       | 
          | Norad                 | 1-(203)748+3974 |  <Classified>   | 
          +-----------------------+-----------------+-----------------+ 
 
------------------------------------------------------------------------------- 
 
                     --=] National Security Anarchists [=-- 
                         --=] Volume I, Issue IV [=-- 
                               --=] Presents [=-- 
 
                     --=] The Serious Side of Hacking [=-- 
                             == The Place to be! == 
 
 
                             QSD is the place to be! 
                               QSD for you and me! 
                          Down with Lutz and the like 
                               QSD is ALL I like 
 
                                 Getting codes, 
                                  good or bad. 
                        Meeting girls, or be they fags? 
                          Down with Lutz and the like 
                               QSD is ALL I like 
 
                           Careful watch what you say 
                          keep those scanners far away 
                     but thats half the fun, I do proclaim. 
                        Death to those who say its lame! 
                          Down with Lutz and the like 
                               QSD is ALL I like 
 
                          Are you chatting with a fed? 
                          or is the guy a fag in drag? 
                         It don't matter what you say, 
                       just keep those scanners far away. 
                          Down with Lutz and the like 
                               QSD is ALL i like 
 
                       Give your home phone away to all, 
                        have them fags give you a call. 
                             Real names are a must 
                        friends at QSD you ALWAYS trust 
                          Down with Lutz and the like 
                               QSD is ALL i like 
 
                            QSD is the place to be! 
                              QSD for you and me! 
 
------------------------------------------------------------------------------- 
 
 
                     --=] National Security Anarchists [=-- 
                         --=] Volume I, Issue IV [=-- 
                               --=] Presents [=-- 
                              --=] Info World [=-- 
 
  We at NSA, decided that World News and Telco Briefs are basicly the same idea 
  divided up into two sections.  Therefore resulting in the mixture of both, 
  Info World.  This is where one can develop a good source of knowledge of 
  Teleco/Hacker Information.  Here, one can see what new advancements have 
  taken place/problems have happened in the Teleco/Hacker World.  Also one can 
  see and theorize how Ma Bell can use her new technology to destroy us.  Even 
  if the idea is petty, but expand on that idea.  We do tell you our views so 
  that hopefully Hackers/Phreakers will develop their own, be able to create 
  their own views/theories.  To create that realization for him/herself, which 
  then creates a better understand of our Society and yourself.  Do you limit 
  your imagination... 
 
------------------------------------------------------------------------------- 
                     ------------------------------------- 
                       == PAC Bell, NEC Sign SMDR Pact == 
                                == Telephony == 
                     ------------------------------------- 
 
  Pacific Bell has inked an agreement to market NEC Technologies' Centrex-based 
  station message detail recording (SMDR) and call accounting equipment to it's 
  California Centrex customers. 
 
  The additional products are expected to help make Pacific Bell's Centrex 
  offering more attractive and competitive with customer premises-based network 
  solutions. 
 
  The NEC gear, known as Centrex Telemanagement, lets telecos offer call 
  accounting, traffic management, automated directory, facilities management, 
  and equipment and feature inventory through the central office.  The 
  equipment can interface with AT&Ts 5ESS and 1AESS switches, Northern 
  Telecom's DMS-100, and NEC's own equipment, according to Susan Schneider, 
  product marketing specialist with Boxborough, Mass. based NEC Technologies. 
 
 
                      ----------------------------------- 
                        == MCI Readies Data Platform == 
                                == Telephony == 
                      ----------------------------------- 
 
  MCI has unveiled the platform that will bring its Virtual Private Data 
  Services (VPDS) into the future, as well as the first offering via platform: 
  a frame relay service. 
 
  At the International Communication Association show in Anaheim, California, 
  in the first week of June.  MCI unveiled plans to deploy a nationwide, 
  cell-based network platform to support next generation broadband data 
  services under its VPDS umbrella.  The first service offered on the platform, 
  frame relay, will be available in the second quarter of 1992., according to 
  Don Heath, MCI vice president for data marketing.  The network also offers a 
  migration path to future services, including switched multimegabit data 
  service and asynchronous transfer mod-based broadband integrated services 
  digital network, he said. 
 
  "What MCI is offering is a clear migration path to tomorrow's communications 
  networks," Heath said.  "We're opening the door to make broadband ISDN 
  services a reality." 
 
  The broadband platform will be cell-based, using 53-byte, fixed-sized data 
  packets.  Initially, MCI will offer the data services on permanent virtual 
  circuits.  Later, MCI will offer switched virtual circuits, which will 
  permit direct dial-up network with ISDN primary rate interface access. 
  Network access will be offered at 56Kb/s, fractional T-1 and T-1 speeds; 
  the backbone will operate at full T-1. 
 
 
                    ---------------------------------------- 
                      == AT&T Previews New Marine Cable == 
                                == Telephony == 
                    ---------------------------------------- 
 
  AT&T Submarine Systems will introduce a new undersea cable product line at 
  Telecom '91 in Geneva this October, the company said at the beginning of 
  June.  Known now as the SL2000 cable system, the product will be renamed, and 
  a prototype exhibit will be on display at the show. 
 
  Although AT&T will design, install and maintain the system, the company has 
  been working with Kokusal Denshin Denwa of Japan for the past year to develop 
  optical amplifier technology for the SL2000 according to Debra Guancione, 
  product manager for AT&T Submarine Systems. 
 
  Current underseas systems require repeaters every 20 mile to 60 miles. 
  AT&T hopes to reach beyond 60 miles by the time the product becomes 
  available for service in 1995. 
 
  The cable system will package together bit rate-sensitive terminal equipment, 
  dispersion-shifted fiber, optically amplified repeaters and cable, all 
  configured according to customer requirements.  It will offer rates of 5 
  Gb/s, 25 Gb/s or 622 Mb/s per fiber pair. 
 
 
                      ----------------------------------- 
                        == Motorola and Pactel Trial == 
                                == Telephony == 
                      ----------------------------------- 
 
  Motorola and PacTel Corporation will conduct field tests and market trails of 
  Code Division Multiple Access (CDMA) digital cellular technology.  The trials 
  will take place in PacTel Cellular's Southern California service area.  The 
  agreement follows more than a year and a half of CDMA testing already 
  conducted by the two companies.  Among the activities planned for the trial 
  is the validation of Common Air Interface (CAI) specification.  CDMA and TDMA 
  represent two competing technologies designed for migrating cellular systems 
  to a digital standard and increasing subscriber capacity. 
 
 
                        -------------------------------- 
                          == Teleport Opts for ISDN == 
                                == Telephony == 
                        -------------------------------- 
 
  TC Systems, a subsidiary of the Telport Communications Group, is now 
  providing local ISDN connectivity for Manhattan-based customers that need to 
  maintain ISDN links with both Europe and the far Esat.  The first customer to 
  sign up for the new service is banking giant Citicorp, who will use it to 
  establish connections with London, Brussels, Dusseldorf, and Singapore.  TC 
  Systems also operates one of the nations' largest ISDN "islands" consisting 
  of over 6000 BRI liens, currently being used by its parent company Merill 
  Lynch. 
 
 
                      ------------------------------------ 
                        == New York Tel Decentralizes == 
                                == Telephony == 
                      ------------------------------------ 
 
  New York Telephone is reorganizing along geographical lines, it disclosed 
  Friday.  The goal is to bring services, "closer to our customers," a 
  spokesman said, but gave no exact date for full implementation of the new 
  organization. 
 
  The reorganization creates three geographic market areas, each under a group 
  vice president, Douglas Mello, previously president of Nynex Business 
  Information Systems, will be responsible for midtown and southern Manhattan 
  and for the company's special data services for its top 200 accounts.  Arnold 
  Eckelman, former assistant vice president-operations, will be responsible for 
  norther Manhattan, the Bronx, Brooklyn, Queens and Staten Island.  Particia 
  Higgins, formerly AT&T's vice president for international sales operations, 
  will head the company's Long Island, mid-state and upstate New York 
  operations. 
 
  The decentralization is necessary to respond to "enormous" changes in the 
  telecommunications marketplace, including increased competition, said Richard 
  Jalkut, president and CEO.  The new organizations "will give us the 
  flexibility we need to respond to these changes," he said. 
 
 
                      ------------------------------------ 
                          == San Bernerdino Outage == 
                        == Internal GTE/AGCS Document == 
                      ------------------------------------ 
 
 
  On 6/19/91 at 7:34 P.M. San Bernardino, Ca. which serves 55,000 subscribers 
  experienced a 2 hour and 9 minute outage. This outage  was caused by a fault 
  in the Space Switch Interface Controller (SIC).  The SIC is the interface 
  between the APC/TPC's and the Space Switch portion of the Base Unit Network. 
  Without the SIC no call processing can take place since no network paths can 
  be established.  The SIC portion of the GTD-5 is a duplex device and should 
  not cause a total outage.  However, under certain double fault or backplane 
  fault conditions a duplex device can cause system outages. 
 
  San Bernardino has had a history of SIC problems, but none that had caused a 
  problem of this magnitude.  During early 1990 West Area personal worked on 
  the SIC - and no problems were reported for 8 months. 
 
  Beginning 6/21/91 (after the latest outage) I have been working with AGCS and 
  West Area TSS personnel to resolve this problem.  AGCS TAC and R&D personnel 
  were dispatched to the site to work with local personal on Saturday and 
  Sunday nights (6/22 and 6/23) to try and isolate the problem.  While using a 
  scope to monitor certain suspect leads, a SMA syndrome similar to the 
  syndromes output during previous problems was output.  No outage occurred. 
  Based upon this SMA being output when the pin was touched, a decision was 
  made to replace on of the wires that appeared to be very tight and could 
  possibly have "worn through" insulated or could have been pulling against 
  another pin.  After replacing the wire AGCS and TSS personnel could not cause 
  the syndrome to be generated. 
 
  On 6/24/91 we held a meeting to assess the progress in resolving the problem. 
  At that time we could not get more than a 70 percent comfort level that the 
  fault that had caused the outage had been cleared by replacing the wire. 
  Inspection of the wire under a microscope has not displayed any flaws. 
 
  Based upon the risk that another outage could occur, TSS west and myself have 
  recommended that the SIC backplane be replaced as soon as possible.  AGCS is 
  currently procuring the backplane.  A decision has been made to use a roll 
  around/portable frame to house a temporary SIC while the backplane is being 
  replaced.  The same concept used for the SVR 1641 16 Port BPC retrofit will 
  be used in San Bernardino to replace the SIC backplane.  This process will 
  minimize the outage time caused by the changeout. 
 
------------------------------------------------------------------------------- 
 
 
                     --=] National Security Anarchists [=-- 
 
      If you feel that you have talent in journalism and wish to have you 
   Name/Group appear in National Security Anarchists Newsletter, please send 
          your submissions to The Frayed Ends of Sanity 602/861+3167. 
 
       Submissions should fit under one of the following generalizations 
 
                          System Operations Knowledge 
                               System Programming 
                                Telecommunication 
                     Recent Hack/Phreak/Telco News Articles 
                             Letters to the Editor 
 
------------------------------------------------------------------------------- 
 
                          National Security Anarchists 
                     "Plagiarism is the Basis of Creativity" 
 
                                ##  ## ###### ###### 
                               ### ## ##     ##  ## 
                              ###### ###### ###### 
                             ## ###     ## ##  ## 
                            ##  ## ###### ##  ## 
 
                      National Security Anarchists Members 
 
                                   Mind Rape 
                                  Dead Addict 
                                I-Shence Master 
                                 Angel of Death 
                                   Dark Druid 
                                  Mci Sprinter 
                                  The Serpent 
 
                          * NSA World Head Quarters * 
                     The Frayed Ends of Sanity Unix System 
                                  602/861+3167 
 
------------------------------------------------------------------------------- 
                          National Security Anarchists 
                     "Plagiarism is the Basis of Creativity" 
                              All Rights Reserved 
        Any modifications to this text file is a violation of copyright 
                                  - (c) 1991 - 
 
-------------------------------------------------------------------------------- 
 
Downloaded From P-80 Systems 304-744-2253 
 
 
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+