1601 lines
82 KiB
Plaintext
1601 lines
82 KiB
Plaintext
|
|
|
|
--=] National Security Anarchists [=--
|
|
--=] Volume I, Issue IV [=--
|
|
--=] Date Released: 8/14/91 [=--
|
|
|
|
== NSA Editorial ==
|
|
|
|
|
|
Welcome to National Security Anarchists Issue 4. Yes we at NSA do admit this
|
|
Issue has taken some time since our previous releases. Not to worry NSA is
|
|
still in existence and we shall continue always. Why for the delay, Muds.
|
|
Trust me, Muds eats Hackers. If you are planning to play muds, Rest assured
|
|
that you best say bye bye to your Hacking Career. As I type this
|
|
Introduction, Dead Addict is blabbing "Dick Van Dyke, Starring Dick Van
|
|
Dyke". And has raised an interesting question. Why do these old shows have
|
|
separate beds for the Married Coupled. And also these Married Couples have
|
|
Children?!?
|
|
|
|
Many of you have raised a point that is obvious. We copy our material from
|
|
books/trash/manuals. Yes we do and we always have admitted it. Our Motto
|
|
states "Plagiarism is the Basis of Creativity". Why do we copy straight from
|
|
the manuals/trash? Simple! The best source of Information is from the
|
|
Source. Here is a simple analogy to explain it even more. Information is a
|
|
juicy Steak. And Most groups take this information and reword it. Thus this
|
|
is Second Hand teaching, and plus you are learning what they learned.
|
|
Therefore that is in comparison to chewing up a steak and feeding you
|
|
tasteless bits. Now we at NSA give you that Steak, unchewed, unprocessed, so
|
|
you to can enjoy that same flavor that we experience when examining this
|
|
material.
|
|
|
|
Also many of our readers have made several interesting ideas and comments for
|
|
the newsletter. Now The Serious Side of Hacking is available in this
|
|
Newsletter. What is The Serious Side of Hacking, well let I'll let Dead
|
|
Addict explain his section.
|
|
|
|
NSA has released SlimJim Version 1.0 into the Hack/Phreak world. SlimJim is
|
|
a Unix Utility for MS/DOS machines. SlimJim slims those large password files
|
|
and makes them smaller. Plus SlimJim is very fast even on IBM XT compatible
|
|
computers, and saves you space at the same time. SlimJim can be found on
|
|
various Hack/Phreak boards.
|
|
|
|
Soon Silicon Slave Version 2.0 will be released. Yes, another Hack/Phreak
|
|
utility from NSA. Silicon Slave is a collection of common Hack/Phreak
|
|
utilities incorporated into one program. Details will be released later.
|
|
|
|
___Your Editor___
|
|
Mind Rape
|
|
|
|
-------------------------------------------------------------------------------
|
|
Table of Contents
|
|
|
|
Section Subjects
|
|
-------- -------------------------------------------------------------------
|
|
4.0 NSA Editorial
|
|
4.1 Table of Contents
|
|
% 4.2 Anti-Pirate Video Techniques/GTE Project 358
|
|
4.3 The Challenge of the Industries <Submission>
|
|
% 4.4 405MB Optical Line Terminating Multiplexer Glossary
|
|
% 4.5 Human Speech Understanding/GTE Project 426
|
|
4.6 VMB Shuffle <Submission>
|
|
4.7 Serious Side of Hacking
|
|
4.8 Info World
|
|
4.9 NSA Information
|
|
|
|
% - If you are not an authorized USWest/GTE/AT&T/MCI/SPRINT/NEC Employee, you
|
|
are not permitted to read this information. To do so, is a violation of
|
|
Federal Law. Unauthorized reading/obtainment of the following documents
|
|
will result in Imprisonment & fines being issued.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
|
|
--=] National Security Anarchists [=--
|
|
--=] Volume I, Issue IV [=--
|
|
--=] Presents [=--
|
|
|
|
== Anti-Pirate Video Techniques ==
|
|
== GTE Project 358 ==
|
|
|
|
|
|
Project 358 continued to explore video techniques in areas of copyright
|
|
protection, scrambling, and video storage. Emphasis was placed on
|
|
development of hardware and software to demonstrate the feasibility of
|
|
network-based copyright protection. Figure 358-1 depicts VCS functional
|
|
blocks. The copyright protection scheme encrypts video material by
|
|
scrambling each vertical field and embedding program serial number, field
|
|
number, and error correction codes in one horizontal line of the vertical
|
|
blanking interval (VBI). Public domain encryption techniques are used to
|
|
recover 15-bit pseudo-random descrambling codes. Decryption requires the
|
|
keys(s) provided by a remote database, accessed through a low-speed
|
|
communication link (telephone network). This allows viewing control and
|
|
revenue collection by intelligence in the remote database, but facilitates
|
|
copying and distribution of protected material.
|
|
|
|
The encryption scheme has two levels, one for protection of video
|
|
descrambling codes embedded in the VBI, and one for protection of messages
|
|
between the home and the remote database. The encryption technique assumes
|
|
the potential pirate knows the encryption algorithm and demonstrates years of
|
|
work time to decrypt protected material without database-controlled keys.
|
|
The copyright protection scheme provides high-integrity protection of video
|
|
material until the key(s) is released, which provides security for live
|
|
broadcast and/or the recording and distribution phase of video cassettes.
|
|
While there are various schemes for protecting decrypted material from
|
|
copying during viewing, including locating the decryption function inside a
|
|
special TV or video monitor, none of the schemes provides significant
|
|
protection from the sophisticated pirate.
|
|
|
|
|
|
---------------------------------
|
|
== Figure 358-1 ==
|
|
== Viewing Control System =
|
|
---------------------------------
|
|
|
|
Clocks Phase Locked
|
|
Analog Subsystem to
|
|
Hortzontal Rate __________
|
|
/--------------\----1.007 MHz Clk------------------------------>/ \
|
|
| GenLock |----503.5 kHz Clk------------------------------>| MC6859 |
|
|
| Video Timing |----2.014 Mhz Clk--->/-----------------\ | |
|
|
| Recovery |----Vert Drive------>| | | Data |
|
|
|--------------|----Hor Blanking---->| |PA7-PA0 | Security |
|
|
| | | MC68HC05 |------->| Device |
|
|
| VBI | | |PC7-PC0 | |
|
|
| Detection |<------------------->| Microcomputer |------->| (DES) |
|
|
| Insertion | | Unit | \__________/
|
|
|______________| | |
|
|
| | PA7-PA0 | (MCU) |
|
|
| Descramble/ |<--------------------| |PA7-PA0/-----------\
|
|
| Scramble |<--------------------| |<----->| On |
|
|
| | PB7-PB1 | |PB7-PB0| Screen |
|
|
\______________/ 15-Bit \_________________/------>| Prompts |
|
|
^ ^ Descramble/Scramble | | \___________/
|
|
| | Control | |
|
|
| | \_/ \_/
|
|
VCR | RS-232 Port
|
|
|
|
|
TV
|
|
|
|
|
|
This project supports the implementation of a small field-deployable viewing
|
|
control-copyright protection system. Results will be used as building blocks
|
|
to define a viewing control field demonstration for the Cerritos ][ testbed.
|
|
|
|
The past year has seen the development for VCS of MCU software that is
|
|
modular
|
|
for flexibility during further development, yet does not exhaust the capacity
|
|
of the Motorola 6805 microcontroller and is able to operate within the bounds
|
|
of visual field time. VCS processing in the microcontroller of the Home Unit
|
|
is now able to serve three levels of message encryption and apply up to five
|
|
scrambling keys to each video program. It can also handle midtape video
|
|
start, viewing time control, and session cancellation. Developments of
|
|
message overlays and application of "anti-pirate" copy signatures are now
|
|
under way and are scheduled for completion in the 1991's.
|
|
|
|
A significant effort during 1990 was the design and implementation of a
|
|
unique scheme for generating robust scrambling codes that preserve the
|
|
smoothness of the presentation. The method is based upon encryption of
|
|
successive field numbers. It produces scrambling codes that are uniformly
|
|
distributed and unpredictable, hence largely pirate-proof, yet can be easily
|
|
recovered by the system when videotape flaws prevent reading of field numbers
|
|
from the tape itself.
|
|
|
|
Six patents were filed on viewing control system techniques during the year.
|
|
|
|
Preliminary meeting were held with three studios, one TV manufacturer, and
|
|
one anti-taping technology company. A presentation was also made to the T3
|
|
Standards Committee.
|
|
|
|
This project also supports activities relating to standards, including
|
|
attendance at T1Y1 and HDTV groups, as well as the EIA Multiport Receiver
|
|
Group. A North American standard for compressing digitized video is under
|
|
active investigation by the T1Y1.1 Experts Group on DS3 TV. GTE Laboratories
|
|
had increased activity in this field by attending the meetings held by the
|
|
Experts Group. These meetings are usually attended by representatives of the
|
|
T1Q5.5 Experts Group who are concerned with performance standards for
|
|
digitized video transmission and represent the broadcasters and others.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
|
|
--=] National Security Anarchists [=--
|
|
--=] Volume I, Issue IV [=--
|
|
--=] Presents [=--
|
|
|
|
== The Challenge of the Industries ==
|
|
== Dennis C. Hayes ==
|
|
== Speech at BellCore's CPE WorkShop ==
|
|
|
|
== Contributing Writer ==
|
|
== Mobius Drux ==
|
|
|
|
|
|
Below is a capture from HAYES, it is from the President of Hayes speaking on
|
|
the future of ISDN. Hey, folks this is the future so it would be to your
|
|
advantage to at least know whats going on.
|
|
|
|
"Waiting for ISDN to Happen..."
|
|
|
|
That phrase is a phrase that is seen often -- in magazines we read -- in
|
|
speeches we hear or in meetings we attend. "When will ISDN happen?" Our
|
|
market and product planning departments ask. Our customers ask. The
|
|
analysts and media make their predictions.
|
|
|
|
In the last two years, the magazine articles and speeches are changing:
|
|
something has happened. In the last year people are now questioning
|
|
|
|
"WILL ISDN ever happen?"
|
|
|
|
As for the question, "Will ISDN ever happen?", we all know the answer is
|
|
yes. ISDN will happen and ISDN is happening. The countries in North America
|
|
cannot afford to allow our communications services to be incompatible or
|
|
non-competitive with communications services used by our companies' and
|
|
America's global competitors. ISDN is happening in Europe and is beginning
|
|
in Asia and our region of the world cannot afford to be left out. ISDN must
|
|
happen in North America.
|
|
|
|
But there is a perception problem and the members of our computer and
|
|
telecommunications industries must solve the problems that still inhibit the
|
|
commercialization of ISDN.
|
|
|
|
If we were to graph the public interest in ISDN, we would see a "Spike of
|
|
Expectation" during 1986 - 1987 -- even into 1988. People believed that ISDN
|
|
would make an impact on businesses and were excited about the possibilities
|
|
of using this technology. But when the expectations were not met,
|
|
excitement was followed by a "Valley of Disappointment." We must begin
|
|
building the excitement again -- but at a realistic level of steady growth --
|
|
where the public interest matches the industry's capability. A steady
|
|
growth of capability over the next year or two will rebuild confidence. We
|
|
must provide concrete and tangible evidence of this steady growth of ISDN
|
|
deployment on an ongoing basis. Keep in mind the person who has to make the
|
|
decision to buy the service. What makes the MIS Manager or Telecommunications
|
|
Manager buy the service and products that implement ISDN? What makes them
|
|
convince the CIO that ISDN is worth the investment?
|
|
|
|
The COS (Corporation for Open Systems) announcement about ISDN 1 has
|
|
rekindled public interest and is a step in the right direction, but we and
|
|
all of our colleagues in the industry must remove the real and perceived
|
|
barriers to successful commercialization.
|
|
|
|
Part of the problem that caused the "Valley of Disappointment" comes simply
|
|
from the concept of time in the computer industry being so different from the
|
|
concept of time in the telecommunications industry.
|
|
|
|
The computer industry: predominantly data oriented -- and not regulated.
|
|
People expect computer technology to change rapidly and it usually does.
|
|
It is much easier for the computer industry to develop new products because
|
|
they do not face the barriers that the telecommunications industry faces.
|
|
|
|
Look at local area networking. It took several years but it was fairly easy
|
|
for the computer industry to bring that technology into businesses. LANs
|
|
were market and technology-driven applications that faced no regulatory
|
|
barriers.
|
|
|
|
The telephone industry, on the other hand, is a much older industry that is
|
|
affected by a number of restraints which throttle change: compatibility with
|
|
the existing network and the federal and state regulatory barriers -- just to
|
|
name two.
|
|
|
|
The telephone industry's roots are with voice services to residential
|
|
customers even though data traffic is rapidly growing. There is less
|
|
understanding of data services and very little understanding of the
|
|
integration of voice and data by most employees in North American telephone
|
|
companies.
|
|
|
|
So the two different cultures must meet. And ISDN needs to bring the merger
|
|
of these two industries together very quickly. ISDN is causing a tighter
|
|
coupling, tighter integration -- particularly with the integration of voice
|
|
and data -- making computers and telecommunications come together faster.
|
|
|
|
But as we all know -- there are barriers we face. In March 1988, I gave a
|
|
speech for an ISDN User's Group here in Atlanta on "Removing the Barriers to
|
|
ISDN." I am sure that many of you have heard or have made a similar speech:
|
|
All of us must work to overcome the barriers, from those in the industry who
|
|
provide the service and equipment to the customers who use the service and
|
|
buy the products. It is our job to motivate the customers.
|
|
|
|
ISDN is being limited. Limited by service availability, the regulatory
|
|
environment, tariffs, incompatibility between products, complexity of
|
|
provisioning and installation, and knowledge about deployment -- just to name
|
|
a few of the barriers. Deployment plans and capital budget are crucial
|
|
elements that throttle the retooling of the telephone company workforce.
|
|
|
|
Service providers must rethink the way they develop and deploy technology.
|
|
If they want to play an increasing role in the rapidly growing data market,
|
|
the telephone companies will learn to think of central offices as "data
|
|
centers."
|
|
|
|
CPE vendors must evaluate and revise the way they develop and provide
|
|
equipment to users, as well as the way the applications get implemented to
|
|
use the service.
|
|
|
|
And as we begin to break down these barriers we must focus on our customers'
|
|
needs, keeping in mind the person who has to make the decision to buy the
|
|
service and equipment. We must offer the service and products that make
|
|
communications more efficient and cost effective, and that give the user a
|
|
competitive advantage in his business.
|
|
|
|
But, how can we expect a customer to implement ISDN today? We make it
|
|
difficult for the MIS Manager or Telecommunications Manager to buy the
|
|
service and our products. An MIS Director cannot plan a nation-wide or
|
|
global network for their company because he cannot easily determine where
|
|
service is available now -- and more importantly when service will be
|
|
deployed during his planning horizon. And, there is no direct single place to
|
|
go to find the answer. Very few user companies are US-based only. And
|
|
certainly very few companies are based only in one service area. So an MIS
|
|
Director is faced with going to a multitude of sources to collect data just
|
|
to evaluate if ISDN is a viable technology for an important application and
|
|
no one can tell him where to find all the needed information.
|
|
|
|
People in the communications business must communicate and share information.
|
|
With the two industries working together we can leverage our technical
|
|
expertise to benefit our customers.
|
|
|
|
ISDN is technically successful and working today even though improvements
|
|
will be made as standards evolve. What is needed now is the ability for
|
|
cooperative competition to allow the successful commercialization in the
|
|
North American markets. Customer needs can be met by cooperative behavior
|
|
between competitors which will remove real or perceived barriers that the
|
|
customer faces.
|
|
|
|
The Japanese understand cooperative competition. Look at the development of
|
|
the VHS tape player. The modem industry understands cooperative competition.
|
|
The development of CCITT V.42bis is an example of cooperative competition,
|
|
where companies worked together to offer the public the best technical
|
|
solution for compression in modems.
|
|
|
|
It is time to ask our legal departments how we can work together rather than
|
|
allowing them to say that we can't. There are areas such as standards,
|
|
sharing information with customers, and removing the barriers where we can
|
|
legally work together without crossing the line into areas where we compete
|
|
for business.
|
|
|
|
ISDN commercialization takes a great deal of team work from all of us:
|
|
Service Providers; Switch Vendors; CPE Vendors; Applications Developers;
|
|
Resellers. And, we must always be focusing on the end user and their needs.
|
|
Our goal as an industry should be to provide total customer satisfaction --
|
|
which will mean offering a range of solutions.
|
|
|
|
Some of the visionary people in the two industries believe that fiber optics
|
|
and broadband ISDN are the future. Basic Rate Access (BRA) and Primary Rate
|
|
Access (PRA) have their places. BRA can offer a range of applications that
|
|
can create the desktop telecomputing environment that starts the shift from
|
|
the paper-based office to one that is electronically-based.
|
|
|
|
Today the Xerox copier and the fax machine support the paper-based office.
|
|
Basic Rate ISDN is the technology which can initiate a wide-area change in
|
|
multiple locations and to electronic-based communications.
|
|
|
|
Trends show that businesses are changing. They need to be more competitive
|
|
in the global marketplace. They require a shorter cycle time from decision
|
|
making to implementation and they can no longer act as a single unit. A
|
|
business must work together with multiple enterprises. ISDN can be a major
|
|
catalyst that transforms businesses today and brings people into the
|
|
equation.
|
|
|
|
I believe that the integrated services and performance of ISDN will
|
|
fundamentally change the way people and businesses communicate. ISDN is not
|
|
a faster modem. It is not a "nicer" telephone. It is not easier wide-area,
|
|
dial-up switched 56K digital circuit and packet communications. It is the
|
|
combination of these things offered economically, worldwide, that are the
|
|
ingredients for an "office revolution" and a new market for all of our
|
|
industries.
|
|
|
|
ISDN can fuel the transition to an electronically-based office. Things are
|
|
happening in the computer industry -- large screen workstations from
|
|
companies such as Sun, HP, DEC, Apple and IBM. Applications like IBM Office
|
|
Vision, AT&T's Rhapsody, and Lotus Notes. Workstations are no longer for
|
|
"data" processing -- they are for information processing and with the
|
|
integration of voice and data, information processing can be brought to a
|
|
new level of interaction between the people who make decisions and take
|
|
action based on the information.
|
|
|
|
I am sure when the copier was first developed, no one imagined how businesses
|
|
would change -- with the ability of the printing press at their immediate
|
|
disposal. We in the ISDN industry can just begin to think about what can
|
|
happen with true multimedia integration. With voice and data integration,
|
|
people will be able to work on documents together -- no matter where they are
|
|
located.
|
|
|
|
Much of my company's focus has been on developing products that provide the
|
|
platform for good integration of voice and data --- not just products for
|
|
voice -- or products for data.
|
|
|
|
And, we realize the importance of applications developers, the people who
|
|
understand how work is done in an insurance company, a transportation
|
|
company, a retailer, or manufacturing company. These are the people that
|
|
have to drive the implementation of applications for the end user and can
|
|
assist us in exploring the integration of voice and data. We need those
|
|
people who understand the way businesses work to develop the applications
|
|
needed by real users who don't yet know how multimedia integration can change
|
|
their ability to get work done.
|
|
|
|
We have developed PC adapters for the computer to work with the service and
|
|
we have focused on the program interfaces (the Hayes Standard AT Command Set
|
|
for ISDN and the Hayes ISDNBIOS). These interfaces give applications
|
|
developers a platform to write their programs and provide the connection
|
|
between the CPE and the computer.
|
|
|
|
We strongly believe that it is the applications that will make customers want
|
|
to use any service. ISDN will be successfully implemented only when our
|
|
customers perceive it as faster and better, and offering improved price
|
|
performance and giving them some real advantage over their existing telecom
|
|
and datacom solutions. ISDN must allow our customers to meet their needs of
|
|
today but also allow them to take a large step forward in doing difficult
|
|
tasks more easily. ISDN must provide reasonably priced applications that are
|
|
not readily available today with alternative or bypass communications
|
|
solutions.
|
|
|
|
Our challenge is to bring our two industries together and to make ISDN
|
|
happen. To remove the barriers. Don't just create another spike of
|
|
expectation and excitement.
|
|
|
|
This afternoon the computer industry has an incredible opportunity -- the
|
|
opportunity to work together with the telecommunications industry to make
|
|
ISDN happen. For CPE vendors, applications developers, switch manufacturers
|
|
and telecommunications service providers to work together to launch a new
|
|
technology which will bring competitive advantage to our North American
|
|
customers, and fulfill user needs for easily accessed, integrated, efficient,
|
|
and cost effective integrated communications.
|
|
|
|
A simple concept: customers and suppliers working together letting each
|
|
other know what they need to make something happen.
|
|
|
|
Bellcore has given both industries this workshop to begin the talks and to
|
|
open the lines of discussion between the two industries. And, going forward,
|
|
they will continue to play this role through their Resource Personnel.
|
|
|
|
Together the two industries can make ISDN a reality.
|
|
|
|
Just as we heard for six or seven years "This is the year of the LAN"
|
|
announced by our or another of the LAN company's CEO's, there were six or
|
|
seven years of the LAN leading to the success we see today. Today's LAN is
|
|
an important business tool.
|
|
|
|
If we grasp the opportunity Bellcore has given the industry here today on top
|
|
of all that is already being done throughout the industry, then surely we
|
|
will be able to look back and say 1991 was the first year we claim "This is
|
|
the year of ISDN."
|
|
|
|
_ _ _ __
|
|
' ) ) ) / / )
|
|
/ / / ____/___o . . _ / / __ . . _.,
|
|
/ ' (_(_) /_) <__(_/_/_) o o /__/_/ (_(_/_/ /\_
|
|
-
|
|
A MD 20/20 production for the continued Pursuit of
|
|
FREEDOM of COMPUTER INFORMATION (c) Copy-It-Right
|
|
-------------------------------
|
|
-------------------------------------------------------------------------------
|
|
|
|
|
|
--=] National Security Anarchists [=--
|
|
--=] Volume I, Issue IV [=--
|
|
--=] Presents [=--
|
|
|
|
== 405MB Optical Line Terminating Multiplexer ==
|
|
== Glossary ==
|
|
|
|
|
|
This section explains the basic terminology used for operation/maintenance of
|
|
the FD-39001A O-LTM. This glossary also contains terms frequently used by
|
|
NEC/Other Companies in describing fiber-optic transmission systems. Also
|
|
please use this Reference Guide for future issues dealing with Fiber Optics.
|
|
|
|
|
|
Terms Definition
|
|
--------------------- -------------------------------------------------------
|
|
1 x 1 One standby circuit and one working circuit are
|
|
provided; may be controlled by an external SWC or by
|
|
devices internal to the O-LTM.
|
|
|
|
1 x N One standby circuit is provided for N working
|
|
circuits; except for 1 x 1, requires an external SWC.
|
|
|
|
2 x N Two standby circuits are provided for N working
|
|
circuits; the second standby circuit (LPC) can carry
|
|
low-priority working traffic when not required for
|
|
standby use; requires an external SWC.
|
|
|
|
45MB A DS3 signal at 44.736 Mb/s.
|
|
|
|
135MB A digital signal at 139.264 Mb/s.
|
|
|
|
405MB A digital signal at 417.792 Mb/s.
|
|
|
|
ACO Alarm cutoff; disables the local bell and/or lamp
|
|
contacts as determined by strapping on the ALM.
|
|
|
|
AIS Alarm-indication signal; all-mark in the DS3 or SD
|
|
channels inserted by the O-LTM when a failure has
|
|
occurred in the TX (loss of frame synchronization or
|
|
signal) which results in the loss of data; also
|
|
applied when loopback disrupts.
|
|
|
|
ALM Alarm Module
|
|
|
|
ALM INF Alarm interface module.
|
|
|
|
ALM OFF Alarm off; resets local office bell and lamp contacts
|
|
which are strapped for latching operation on the ALM.
|
|
|
|
APD Avalanche photodiode; used as an optical receiver
|
|
|
|
BER Bit-error rate
|
|
|
|
Bridging Mode of operation selected at the external SWC to
|
|
provide pilot signal to standby from system 2 (working
|
|
1); provides signal to standby receive circuits to
|
|
monitor quality of standby and detect failure
|
|
(excessive BER, loss of synchronization)
|
|
|
|
Channel A DS3 signal making up part of a higher-speed signal.
|
|
|
|
Channel Lockout Setting a channel so that it is not switched to the
|
|
standby circuit by automatic switching of the SWC;
|
|
emergency override and forced switch can override the
|
|
lockout.
|
|
|
|
Character Eight scan points or commands used with E2A-APR serial
|
|
supervisory systems; eight characters make up a scan
|
|
display or command display
|
|
|
|
CH R DS3 channel receive module
|
|
|
|
CH S DS3 channel send module
|
|
|
|
Command Display An array of 64 remote control functions (called
|
|
command points) used with the E2A-APR serial
|
|
supervisory interface; each array is arranged in an
|
|
8-by-8 matrix; the supervisory system activates the
|
|
controls via a command request specifying one command
|
|
within the display; command points are logic one (1)
|
|
when activated; command points are unipolar, requiring
|
|
one command point to turn on a function and another
|
|
point to turn it off; unactivated or unused
|
|
(unassigned) command points are logic zero (0); the
|
|
64th command point is always reserved for use by the
|
|
supervisory system.
|
|
|
|
Command Point A remote control function used in an E2A-APR serial
|
|
supervisory system.
|
|
|
|
Command Request Series of messages exchanged between an E2A-APR
|
|
supervisory system and monitored equipment to activate
|
|
a remote control command; the first message designates
|
|
the command display containing the command; following
|
|
echo of this message by the monitored equipment, the
|
|
second message specifies the command within the
|
|
display (one of 63 of the 64 command points in the
|
|
command display); following echo of this message by
|
|
the monitored equipment, the third message is an
|
|
authenticator which causes activation of the command
|
|
after echo of the third message; if any of the echoed
|
|
messages are not identical, the exchange is invalid.
|
|
|
|
DET Detector module (optional)
|
|
|
|
135M DMUX 135MB demultiplexer module
|
|
|
|
405M DMUX 405MB demultiplexer module
|
|
|
|
Display Alarm and remote control format used with Bell E2A-APR
|
|
serial interface; see scan display and command
|
|
display.
|
|
|
|
DS3 A digital signal with a signaling rate of 44.736 mb/s
|
|
and often referred to as 45MB.
|
|
|
|
DSX-3 A cross-connect for DS3 signals.
|
|
|
|
E2A-APR A serial input signal to a Bell-standardized Alarm
|
|
Processing Remote (APR) and used by NEC to drive
|
|
either Bell-standardized or NEC-proprietary
|
|
supervisory equipment.
|
|
|
|
EEPROM Electrically erasable PROM which can be rewritten.
|
|
|
|
Emergency Override Switching performed at the O-LTM to override the
|
|
automatic protection switching; switches only the end
|
|
at O-LTM; highest priority switching.
|
|
|
|
E/O CONV Electrical-to-optical converter
|
|
|
|
FDF Fiber distribution frame; frame equipped with up to
|
|
108 optical-fiber terminations for patching to optical
|
|
transmission to rest equipment.
|
|
|
|
FDP Fiber distribution panel; panel for mounting in a
|
|
frame and equipped with up to 16 optical-fiber
|
|
terminations for patching to optical transmission or
|
|
test equipment.
|
|
|
|
Forced Switching Performed at the SWC to place one end of a circuit on
|
|
or off the standby circuit; highest priority at the
|
|
SWC but lower than emergency override at the O-LTM.
|
|
|
|
FOTS Fiber-optic transmission system
|
|
|
|
LD Laser diode; used as an optical transmitter
|
|
|
|
Local Loopback Loopback originated at the local O-LTM and within the
|
|
local O-LTM; provided at 134MB and 405MB in the
|
|
FD-39001A (405MB) O-LTM.
|
|
|
|
Loopback Testing and troubleshooting aid which causes a
|
|
transmitted signal to be returned to the receiver in
|
|
the same O-LTM; see local loopback and remote
|
|
loopback.
|
|
|
|
LPB CONT Loopback control module (optional)
|
|
|
|
LPC Lowt-priority channel; a protection crcuit (or
|
|
circuits) also used to carry low-priority traffic
|
|
which can be disrupted if the circuit is needed as a
|
|
protection circuit to carry higher-priority traffic;
|
|
the second protection circuit in 2 x N configurations.
|
|
|
|
L SW R LPC switching module (receive)
|
|
|
|
L SW S LPC switching module (send)
|
|
|
|
Manual Switching Performed at the SWC to override the automatic
|
|
switching to place a circuit on the standby; switches
|
|
both ends of the circuit; lower priority than
|
|
emergency override or forced switching.
|
|
|
|
Manual Preemption Performed at the SWC to place a circuit on the
|
|
Switching standby; switches both ends of the circuit; lowest
|
|
priority; automatic switching can preempt the standby
|
|
circuit.
|
|
|
|
Monitored Equipment A device connected to an E2A-APR supervisory system
|
|
and reporting alarm or status information to or
|
|
receiving control signals from that supervisory
|
|
system.
|
|
|
|
Muldem Multiplexer/demultiplexer
|
|
|
|
Multimode Optical-fiber cable capable of transmitting light of
|
|
more than one mode.
|
|
|
|
135M MUX 135MB multiplexer
|
|
|
|
405M MUX 405MB multiplexer
|
|
|
|
O/E CONV Optical-to-electrical converter
|
|
|
|
O-LTM Optical Line-terminating multiplexer; line terminating
|
|
equipment with multiplexing/demultiplexing
|
|
capabilities
|
|
as well as facilities to convert electrical signals to
|
|
optical and vice versa.
|
|
|
|
Orderwire Voice channel for nonrevenue communication between
|
|
stations.
|
|
|
|
O-REP Optical repeater; regenerator for insertion in optical
|
|
lines.
|
|
|
|
Parallel Interface Discrete dry relay contacts provided to access
|
|
supervisory equipment.
|
|
|
|
Pigtail Optical-fiber cord containing a single optical fiber
|
|
and used to terminate a multiple-fiber cable: one end
|
|
is bare and is spliced to a longer cable; the other
|
|
end is equipped with a connector to mount in the FDF
|
|
or FDP or to connect to the O-LTM or o-REP.
|
|
|
|
Protection A circuit used termporarily to carry traffic for a
|
|
defective working circuit: a standby circuit.
|
|
|
|
PWR Power supply module
|
|
|
|
Remote Loopback Loopback originated in one O-LTM and occurring from
|
|
the transmitter in the originating O-LTM through the
|
|
receiver and transmitter in another O-LTM through the
|
|
receiver and transmitter in another O-LTM to the
|
|
receiver in the originating O-LTM in the FD-390001A
|
|
(405MB), standard at DS3 level and available with the
|
|
optional LPB CONT module at 405MB line level; see
|
|
repeater loopback, also.
|
|
|
|
Repeater Loopback Remote loopback performed with repeater fault locator
|
|
with optional LPB CONT and DET modules; remote O-LTM
|
|
and O-REP can be accessed.
|
|
|
|
SC Lines Switch control lines interconnecting SWC; usually
|
|
carried on the overhead of the FOTS
|
|
|
|
Scan Display An array of 64 alarms or status indications (called
|
|
scan points) used with the E2A-APR serial supervisory
|
|
interface; each array is arranged in an 8-by-8 matrix;
|
|
each horizontal row of eight scan points constitutes a
|
|
character; the supervisory system interrogates the
|
|
monitored equipment via a scan request specifying one
|
|
character within the display; scan points are logic
|
|
one (1) when abnormal or in the alarm condition;
|
|
normal or unused (unassigned) scan points are logic
|
|
zero (0); the 64th scan point is always reserved for
|
|
use by the supervisory system.
|
|
|
|
Scan Point A status or alarm indication used with E2A-APR serial
|
|
supervisory systems.
|
|
|
|
Scan Request Series of messages exchanged between an E2A-APR
|
|
supervisory system and monitored equipment to
|
|
interrogate the monitored equipment; the first
|
|
message designates the scan display and character
|
|
containing the desired scan points; following receipt
|
|
of the character from the monitored equipment, the
|
|
request is repeated; the monitored equipment resends
|
|
the character; if the resends are not identical, the
|
|
exchange is invalid.
|
|
|
|
SD INF Service data interface module (optional)
|
|
|
|
SD Channels Service data lines provided n the overhead of the
|
|
FOTS; used to carry nonrevenue traffic such as SC
|
|
lines, supervisory signals, and orderwire circuits.
|
|
|
|
Serial Interface E2A-APR (RS-422) circuit complying with Bell CD #149,
|
|
issue 2, and PUB 49001; used to access supervisory
|
|
equipment manufactured by NEC or others
|
|
|
|
Single Mode Optical fiber capable of transmitting only one mode of
|
|
light.
|
|
|
|
Standby A protection circuit
|
|
|
|
Supervisory Surveillance equipment or system used to monitor and
|
|
control a transmission network.
|
|
|
|
S SW R Standby switching module (receive)
|
|
|
|
S SW S Standby switching module (send)
|
|
|
|
SV Supervisory equipment or system
|
|
|
|
SW Switch modules; see L SW R, L SW S, S SW R, S SW S, W
|
|
SW R, W SW S.
|
|
|
|
SWC A protection switch controller; an external device
|
|
used to monitor O-LTM and control the switching of
|
|
signals from working systems or channels to standby
|
|
systems or channels; high-speed O-LTM usually perform
|
|
the switching under control of the SWC; some O-LTM
|
|
contain no switching and switching takes palce in the
|
|
SWC.
|
|
|
|
SW INF Switch interface module (1 x N and 2 x N)
|
|
|
|
SWP CONT Switch panel control module (working 1 x 1)
|
|
|
|
SWP INF Switch panel interface module (standby 1 x 1)
|
|
|
|
System Digital signal consisting of combinations of
|
|
lower-speed signals (usually DS3). 135MB (139.264
|
|
Mb/s) equipment (FD-33001A, FD-33101A, FD-33102A) has
|
|
three DS3 signals; 405MB (417.792 Mb/s) equipment
|
|
(FD-390001A, FD-39101A, FD-39102A) has nine DS3
|
|
signals.
|
|
|
|
UART Universal asynchronous receiver/transmitter; used to
|
|
send or receive signals on a serial interface bus.
|
|
|
|
WDM Wavelength-division multiplexing; by sending two
|
|
optical signals with different wavelengths,
|
|
fiber-optic cable capacity can be doubled. WDM
|
|
operation is either unidirectional in which both
|
|
signals are transmitted in the same direction or
|
|
bidirectional in which one signal is transmitted in
|
|
one direction and the second is transmitted in the
|
|
opposite direction.
|
|
|
|
Working A circuit carrying revenue traffic
|
|
|
|
W SW R Working switching module (receive)
|
|
W SW S Working switching module (send)
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
|
|
--=] National Security Anarchists [=--
|
|
--=] Volume I, Issue IV [=--
|
|
--=] Presents [=--
|
|
|
|
== Human Speech Understanding ==
|
|
== GTE Project 426 ==
|
|
|
|
|
|
Research in Project 426 focused on areas of human speech understanding and
|
|
cognitive psychology that are critical to introducing automation in telephone
|
|
operations, and to designing effective human-computer interfaces. In
|
|
addition, substantial support was provided to GTE Airfone, and research was
|
|
also directed at understanding how factors associated with wireless
|
|
communication (e.g., time delays, low-bit-rate speech coders, various channel
|
|
impairments) can influence conversations.
|
|
|
|
In 1990, Project 426 continued to support Project 533 (Application of
|
|
Automatic Speech Recognition to Telephone Operations) by providing
|
|
information on the characteristics of calls to Customer Service Order Centers
|
|
(CSOCs). Project staff completed analysis of a large set of conversations
|
|
have been cataloged on a variety of dimensions. Based on the information in
|
|
the database, a report was prepared on automating customer service contacts
|
|
by means of computer-based speech recognition. In addition, work has started
|
|
on characterizing vocabulary in different types of conversations (e.g.,
|
|
orders to install versus disconnect service) via automatic indexing and
|
|
cluster analysis.
|
|
|
|
To support detailed analysis of these recorded conversations, the VAX speech
|
|
editor was rewritten using a C++ style object-oriented user interface. A
|
|
study to analyze the timing of question-answer sequences between CSOC
|
|
representatives and customers is now under way.
|
|
|
|
The long-term issues pertinent to the development of speech-based automated
|
|
systems were addressed in a paper presented at an international conference.
|
|
Topics discussed included methods for measuring the complexity of dialogue,
|
|
convergence (the process by which conversant adopt aspect of each others
|
|
speech), and the use of dialogue control acts (extra conversational steps
|
|
that ensure that the conversation proceeds smoothly).
|
|
|
|
Project staff also completed a report on an experiment performed in 1989 that
|
|
was designed to investigate the effects of attentional constraints on the
|
|
processing of natural and synthetic speech.
|
|
|
|
In 1990, work continued on evaluating conversations recorded under controlled
|
|
conditions that simulated one or more factors found in mobile
|
|
telecommunication systems. A new test procedure designed in 1989 was
|
|
refined, and measurement techniques were developed. Using this new
|
|
procedure,
|
|
an experiment to investigate conversation dynamics over delay circuits with
|
|
600 and 1200 ms lags was completed. Resolving the delay question is an
|
|
important first step in the project's investigations of conversation dynamics
|
|
in wireless channels because speech-compression techniques can introduce a
|
|
delay on the order of 150 ms (delays due to switching or transmission may add
|
|
significantly to this figure). The project team is now in the process of
|
|
testing subjects in a second study that includes speech coder/bit error
|
|
conditions using the two-way ASET board developed by the Speech Technology
|
|
Group.
|
|
|
|
Work in support of the second-generation Airfone system focused on the design
|
|
and operation of Seatfone ][. In 1990, project staff completed a series of
|
|
experiments and reports, including a study on user preference for membrane
|
|
keypads, a study of dialing performance using membrane keypads under
|
|
different feedback conditions (both auditory and visual), an assessment of a
|
|
new Seatfone handset, detailed comments and suggestions on a set of flow
|
|
charts intended to illustrate the call-sequence logic of Seatfone ][, and a
|
|
report on the quality of new speech prompts. In addition, work has now
|
|
started on a comprehensive evaluation of the Seatfone ][ design using a
|
|
prototype developed by Airfone and ASIC Designs, and on the preparation of
|
|
detailed user-interface specifications.
|
|
|
|
|
|
--=] National Security Anarchists [=--
|
|
--=] Volume I, Issue IV [=--
|
|
--=] Presents [=--
|
|
|
|
== VMB Shuffle ==
|
|
|
|
== Contributing Writer ==
|
|
== Mobius Drux ==
|
|
|
|
|
|
This Phile is hopefully the first in a series of Philes on VMB's. This is
|
|
also dedicated to Night Stalker (.aka. Flt 255 of (313) in memory of..) , and
|
|
all the fellows at NSA and Disconnected, including but not limited to those
|
|
who have helped, Dark Druid, I-Shence-Master, Mind Rape, A.O.D., Dead Addict
|
|
and Mommie Dearest.
|
|
|
|
I would like to add that all this information contained here within is not
|
|
intended to cause, direct or in any means relate to any illegal activities. I
|
|
can also say the following is true.
|
|
|
|
Title 18 of the United States Code, Section 1030, (Revised 1986) gives the
|
|
Secret Service, among other Federal law enforcement agencies, the right to
|
|
investigate fraud and related activities in connection with "Federal-Interest
|
|
computers."
|
|
|
|
---------------------------------------------------------------------------
|
|
- The above is true and the information below is for educational purposes -
|
|
- only. Plus the information should be free to all! -
|
|
===========================================================================
|
|
8.8.91 VMB Number 1.00 A Info Series on 800.xxx.6245 MAIL Scans
|
|
===========================================================================
|
|
|
|
The purpose of this Phile was to Scan the 800.xxx6245, where xxx is all the
|
|
possible prefixes. 6245 represents MAIL on DMTF fones. So I realized that
|
|
many
|
|
people would take the time to check out this sub-prefix, 6245. I have done
|
|
all the initial information scanning and did not try to invade these systems.
|
|
I hope this information will help you to better understand VMB's. Heck if you
|
|
don't know what a VMB is you should do a little research. I believe LOL #10
|
|
or
|
|
12 is on VMB's. I will however cover some basics.
|
|
|
|
VMB - stands for Voice Mail(Message) Box, this is a voice message system,
|
|
that allows messages, call transfers. ect. - Most work on a 3 or 4
|
|
digit mail box and an associated password to access that box.
|
|
|
|
The problem is alot of systems are getting security wacko and have Password,
|
|
then Box or 8 digit boxes and 8 digits Passwords combos. This phile is not
|
|
meant for you to hack these numbers but just as an informational source. As
|
|
an Anarchist or CyberPhreak you can appreciate the wealth of this
|
|
information. These Corporations generally do not take the time to listen. I
|
|
really doubt if they even use there VMB's, however if you have a gripe leave
|
|
a message to those concerned.
|
|
|
|
|
|
========================================================================
|
|
-------- Doing The VMB Shuffle or How to spend a Summer Day -----------
|
|
------------------------------------------------------------------------
|
|
|
|
[A] FH (Fuckin Hacker) 2.0 - Modifications and Setups that were used.
|
|
|
|
[1] Main Menu , Type D for Utilities
|
|
[2] Type A for Config Modem
|
|
|
|
Suggest putting ATL0 or ATL1 in your Modem Initialization string
|
|
to turn the speaker low.
|
|
|
|
[D] PBX Dialing - Turn to YES
|
|
[E] Outgoing Digit - Set to 1800
|
|
[I] Speaker - ON
|
|
|
|
[3] Go to the Target and Valid files and leave only one entry, you can
|
|
delete all the entries, it will leave one that is set at default
|
|
values.
|
|
|
|
[4] Go next to EDIT EXTENDERS
|
|
|
|
Remember this is a VMB run so you need no extenders, but will Add
|
|
new ones. Choose ADD.
|
|
|
|
[A] None leave blank
|
|
[B] None leave blank - The PBX option in the config modem takes
|
|
care of the outdial digits.
|
|
[C] Leave at Local
|
|
|
|
[D] Adjust to your board or leave as defaults.
|
|
[E] Adjust to your board or leave as defaults
|
|
[F] leave off
|
|
[G] Answer Delay - set to 0
|
|
[H] Target Delay - set to 35 or more
|
|
[I] 0
|
|
[J] Code First - YES
|
|
[K] Sequential - I use sequential so I can watch when the cycle
|
|
ends and ESC back and flag ones that completed
|
|
off or read just the scan to the next prefix
|
|
series.
|
|
|
|
[L] Code Length - 7
|
|
[M] Code Template - ##abbbb where ## is the Digit Cycle, a is
|
|
the change cycle and bbbb in this case was
|
|
6245. (Mail). I use a random scan search for
|
|
example I know that the first two digits of
|
|
a prefix cannot be 1 or 2 and the third
|
|
cannot be 0, so I set up my ADDs in a random
|
|
number sequence to cover the numbers from 2
|
|
to 9, ie. 8,2,9,5,7,3,6,4 so the first
|
|
template is 82X6245 then 22X6245 then
|
|
92X6245. The X is important since this is
|
|
what changes from scan to scan. FH doesn't
|
|
go in order and may hit an code sequence two
|
|
or three times so you may hit an prefix once
|
|
every 15 dials.
|
|
|
|
[N] Starting Code - ##abbbb where # is your starting number ie
|
|
82, a is always 1 on the initial pass and increases, bbbb in
|
|
this case is 6245.
|
|
|
|
All other values I leave at default, once I have added the
|
|
prefixes, I go to the extender flagging and flag them all.
|
|
|
|
[5] Flag Extenders - flag all your additions
|
|
[6] ESC and start HACKING from the main menu. I may add that I
|
|
created a batch file that would random hack and wait for 5 - 15
|
|
minutes both ways. Do not spend 8 hours or even more than 30
|
|
minutes Scanning even if you have alot of Ports, running.
|
|
|
|
|
|
------------------ FH VMB Hints and Thins to Watch For. ---------------
|
|
|
|
[B] Pay Attention here. Alot of people miss these hints, they will
|
|
save you time and will even force you to listen durin scanning.
|
|
|
|
You hear a click before the ringing, this is 99% a invalid
|
|
prefix, prepare to hit the SpaceBar to skip this prefix.
|
|
|
|
You here a dial tone, hey this may be a PBX, let us know! If
|
|
you hear some DMFT tones then another ringing, this may be a
|
|
Diverter.
|
|
|
|
You get a message to leave a message, Hit * or # if it
|
|
continues wait for a double beep. This can be a diverter or a
|
|
backdoor into a PBX or you can just playback the messages or
|
|
other stuff.
|
|
|
|
You get a Carrier, fast hit spacebar record the number. In
|
|
the setup I have provided FH may error out because of no Code
|
|
File stated. Check the Carrier later.
|
|
|
|
VMBing works best at night, after business hours, since most
|
|
companies have operators during the day, and you will miss
|
|
and piss off people during the daytime.
|
|
|
|
Be careful of the MCI/US Sprint lines, they have Level D ANI
|
|
and see a display of who called. If they have CA (Call
|
|
Accounting) then they have a record of your number on a
|
|
printout (Sweep Finder).
|
|
|
|
Most Passwords can be the box number or an variation,
|
|
for boxes try either 999,9999,1000 or 1111 these are
|
|
generally the default Telco administrator boxes.
|
|
|
|
These are just a few notes...Now for the Good stuff. Remember, These
|
|
numbers are current as of 8.8.91 so they are fresh, don't burn them
|
|
out. If you do get a Slave going let me know. If there are any
|
|
additions or comments let me know. (See end of Phile to contact me)
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
[C] 1.800.xxx6245 (MAIL) - VMB Scans and Associated Information
|
|
*-Special
|
|
|
|
LD CO. Prefix Company Other Information and Stuff
|
|
----- ------ -------------- ------------------------------------
|
|
AT&T 222 Paradata Aspen,Dial 1 for Dir,4,4,#,box,#
|
|
234* CARRIER Pad x.25
|
|
DELTA 239 West Florida Communications
|
|
AT&T 243 BackStroke 2-leave mail,3-CC# (Dummies!), Meridian
|
|
Mail
|
|
AT&T 247 Audix system password, #
|
|
LDS 256 ? Dial Extension xfer
|
|
AT&T 262 Voice Mail password,#,box * cancel
|
|
COM 266 Voice Message #,box,# * 1 bad attempt
|
|
274 Phone Mail *,box #,3,3
|
|
ITT 275 Digtagraph *-dir,3-box
|
|
MID 279 Bren 1 & 2 1-data card voice, 2-aspen, call xfer
|
|
AT&T 322 US Leasing #,box,logon Network Access,
|
|
Battery St. - 617+4dig, Front St - 7+4
|
|
dig
|
|
USS 326 Phone Mail *,#,box, 2 attempt ops
|
|
AT&T 327 Meridian Mail box,password,#
|
|
AT&T 332 First Fidelity 7dig ext,#,1-spell name,#-access
|
|
MCI 333 Phone Mail last name, ext,#, 3 attempt ops
|
|
AT&T 344 Voice Mail Enter ID
|
|
AT&T 346 Audio Info. Ex *H-help,ID#,password,#
|
|
AT&T 348* Quality Mail *,wait 2 beeps,Enter Remote Access Code
|
|
,#999
|
|
355 ATX Telecom *,#,1,passfirst
|
|
365* CARRIER Pad ID:58 Port:4
|
|
USS 366 Unknown 4,#
|
|
373 Western Union/EasyLink
|
|
388 DET
|
|
395 Voice Mail #,box,#
|
|
MCI 397* 900 Cust. Req. (Backdoor), *-Enter PassCode
|
|
AT&T 426 Meridian Mail
|
|
AT&T 432 SeeBo Insur.Co
|
|
AT&T 433 Support Systems 4,4 #,*
|
|
AT&T 442 Voice Message Exchange
|
|
AT&T 446 Mark's Message ID,#,4,4
|
|
AT&T 448 VGI #,password
|
|
MCI 456* CARRIER Pad ID:DE Port 24
|
|
AT&T 457 Compuserve message, * *, 2 beeps
|
|
487 Voice Mail password,8digit
|
|
AT&T 522 AMD *4-help,box,#
|
|
AT&T 525 Meridian Mail box,#
|
|
AT&T 545 Unknown ID # Please
|
|
AT&T 553 VMS
|
|
AT&T 624 Phone Mail 3,3,#
|
|
AT&T 626 US Tobakey 1-dir,#,*
|
|
AT&T 628** E.L.Lilly AT&T Voice Mail Systems, this is
|
|
the best VMB to call to find out
|
|
VMB information. 8 digit, #,
|
|
1-dir,2-mess,3-rec,4-changes,5-message
|
|
In 3) 5,5,tone,message,*,#,new
|
|
changes, **P=private,*M=options
|
|
@*6,**#=message
|
|
delivery,*R4=outgoing
|
|
message,main
|
|
menu,5,1=create,scan,modify.
|
|
GOOD VMB for AT&T VMB INFO!
|
|
Check this one out.GET IT!
|
|
AT&T 634 Alliance Health 4,4
|
|
AT&T 643 Coke Cola
|
|
AT&T 648 VMS
|
|
USS 669 Audio Info. Systems
|
|
MCI 674* Calling Card Bells!/MCI Op. Fon Booth Tymne
|
|
688 Jones Corp. Press 1,2, * 3,3, error ops.
|
|
MCI 728 MCI Corp
|
|
AT&T 732 SeaLand *=list,2-N.Jersey,3-|Metro,4-Info,3,3
|
|
MICR 741 Pan-American 1-message,2-leave msg,3-group,4-comments
|
|
AT&T 742 Digital Sound #
|
|
EDSC 743 Meridian Mail
|
|
753 Unknown 4,4
|
|
755 Alex Brown 4,4
|
|
765 Bell Leasing
|
|
USS 767 Meridian Mail
|
|
SNET 771* Market Response -2 *'s fast or Ops pickup, 3 dig
|
|
Security Code
|
|
787 5 by 5 3,3
|
|
798 Phone Mail #
|
|
USS 827 Phone Mail # or name,3digit
|
|
AT&T 835 Meridian Mail
|
|
MCI 837 Vace Computers 1-xfer box,2-name,3-tech,5-phone mail,
|
|
#=search
|
|
AT&T 842 AngleHold 4,4
|
|
AT&T 845 Audix
|
|
AT&T 852 Hale&Dores 3,3 *
|
|
AT&T 874 Sounders Inc. 999,3,3
|
|
886 Unknown Call nights
|
|
899 Unknown Call nights
|
|
AT&T 922 Audix
|
|
AT&T 942 Mark's Digital box,#
|
|
MCI 955 O'Brien Corp.
|
|
CBLE 966 Unknown password,#,box,*cancel
|
|
WEST 986* CARRIER
|
|
|
|
------------------------------------------------------------------------
|
|
|
|
[D] Conclusion: Now doesn't that make life easier. Just remember two
|
|
things. 1- When the going get weird, the weird turn pro,
|
|
and 2- Today's weirdness is Tommorrow's reason why. If you
|
|
have any questions or changes or additions or any
|
|
information at all please contact me through:
|
|
|
|
Disconnected @ 602.997.9918
|
|
FES @ 602.861.3167 - id : mdrux
|
|
|
|
|
|
Well, there's 70 VMB's for yah. These are just the .6245.'s believe me there
|
|
are a couple of hundred if not thousand more out there. If you get a slave
|
|
box, do us a favor...share your information.
|
|
|
|
This concludes the first in a series of VMB information. I hope in the future
|
|
to provide some more radical technical information..i.e. Interfacing VMB's
|
|
with PBX's and how it all works, Technical DoX on Major VMB's and maybe
|
|
develop a Scan Klub. Hope you have phun, but do remember if you have a Gripe
|
|
tell it to the President of the Company...LEAVE A MESSAGE IN THE VMB!
|
|
|
|
_ _ _ __
|
|
' ) ) ) / / )
|
|
/ / / ____/___o . . _ / / __ . . _.,
|
|
/ ' (_(_) /_) <__(_/_/_) o o /__/_/ (_(_/_/ /\_
|
|
|
|
A MD 20/20 production for the continued Pursuit of
|
|
FREEDOM of COMPUTER INFORMATION (c) Copy-It-Right
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
|
|
--=] National Security Anarchists [=--
|
|
--=] Volume I, Issue IV [=--
|
|
--=] Presents [=--
|
|
|
|
--=] The Serious Side of Hacking [=--
|
|
--=] Literature, Poetry, Humor, Sarcasm, Hacking, Sex [=--
|
|
|
|
|
|
That is what The Serious Side of Hacking is all about. Poetic hackers are
|
|
perhaps one of the most neglected minorities in the country. Looking on a
|
|
list of possible scholarships, I see "Homosexual, Blind, Black Agraphobes",
|
|
but no poetic hacker. Lets face it, society just ignores us. Fellow hackers
|
|
just ignore us. No more. Now we have an entire dedicated section in the
|
|
most prestigious hacking newsletter (that has my name on it) ever produced.
|
|
Now, why me, why not our capable editor Mind Rape? Very good question... I
|
|
was going to let him write this section... Then I heard some of his poetry.
|
|
I handle this section now. (offence intended, Mind Rape). However, this is
|
|
not only a poets forum, we also support many other neglected hacker topics.
|
|
What topics you say? Lotsa topics.... Previously unreleased boxes, cool
|
|
anarchy techniques, and much, much, more.
|
|
|
|
Mind Rape wanted to call this area "Hacker Sarcasm". I said "ikes, that
|
|
sucks, Mind Rape". But we tried to keep a humoristic view about it, and
|
|
hopefully there will be a pinch of humor in all of this writing.
|
|
Where to complain if you do not like any of this: fuck you, go to hell,
|
|
lemme see you do better, you uncreative, unapreciative louse. (wow, that's
|
|
pretty cool word too - "louse")
|
|
|
|
Unclaimers, Reclaimers, Disclaimers, Recliners - I hereby claim every hacking
|
|
technique ever to be discussed here WORKS. I don't know what the word
|
|
RECLAIMERs means. The only DISCLAIMER this section has is that we take no
|
|
responsibility for the MANY crimes we hope to encourage you, and your friends
|
|
to commit. RECLINERS, great to laze around in.
|
|
|
|
Ok, kids, that looks like about it for now.... enjoy the TSSOH articles
|
|
contained herein (wow, what a cool word!), and Mind Rape, I sure hope to hell
|
|
you don't want me to write an introduction EVERY issue. (see definition of
|
|
RECLINER for my reasons for this request).
|
|
|
|
- Dead Addict -
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
|
|
--=] National Security Anarchists [=--
|
|
--=] Volume I, Issue IV [=--
|
|
--=] Presents [=--
|
|
|
|
--=] The Serious Side of Hacking [=--
|
|
== The INVISIBLE Box ==
|
|
==The first in a series of previously unreleased boxes==
|
|
|
|
An Introduction
|
|
|
|
A friend of mine who is both an electrician and a phone technician has had no
|
|
contact with the computer underground, and yet has managed to design and
|
|
produce several incredible boxes that never have been released. This dear
|
|
soul was kind enough to take me under his wing and show me some of his
|
|
incredible inventions. Luckily for all of us he was not only interested in
|
|
saving some money (he too abhors the idea of paying for ANY phone call), but
|
|
had a healthy interest in anarchy as well. The INVISIBLE box I am about to
|
|
describe is SO incredible it makes the blotto box look like the DONUTHIN box
|
|
(to be released at a later time in this series).
|
|
|
|
|
|
DISCLAIMER: Important! This file was DESIGNED to ENCOURAGE others to break
|
|
laws, commit anarchy, and create havoc. If you have NO intention
|
|
of doing all of the above please do NOT read this. I however
|
|
will take NO responsibility for the MANY laws I hope I to
|
|
encourage you to break.
|
|
|
|
|
|
USAGE:
|
|
|
|
Essentially this is an improved blotto box. But the blotto box, as we know
|
|
was bullshit, this WORKS! (I have, um, er, friends that have told me so, I
|
|
would NEVER break any laws myself). Through the use of the RS232 port on
|
|
your 50mhz IBM compatible we will show you how to destroy ANY, I repeat ANY
|
|
area code you wish to destroy. I know this sounds incredulous but there is
|
|
an essential flaw in the surge protect system that is installed around the
|
|
country. (This system is the reason that the blotto box did not work and
|
|
was bullshit). One of the incredible features that this box has is that it
|
|
is IMPOSSIBLE to trace with existing current technology.
|
|
|
|
|
|
WHAT MAKES THIS BOX POSSIBLE:
|
|
|
|
The flaw with the infamous blotto box is that it tried to instantly fry the
|
|
area code (another flaw is that it tried to kill the area code that you were
|
|
IN). The INVISIBLE box slowly builds up voltage in the remote target until
|
|
the required voltage is established, then discharches just enough voltage to
|
|
create a spike to demolish an area code.
|
|
|
|
|
|
MATERIALS NEEDED:
|
|
|
|
Honda Generator:
|
|
Note: (hey, WOW, they DID get SOMETHING right on that blotto
|
|
bullshit)
|
|
How to obtain: Rent (this costs a bit, so stay with me)
|
|
Steal! (preferred method)
|
|
|
|
486 50mhz IBM Compatible: Why all this power? One of the reasons that this
|
|
has not been done before is that there is not
|
|
enough speed to properly kill off area codes with a
|
|
wimply 486 25mhz, so we have to use a 50mhz
|
|
machine.
|
|
How to obtain: Again, NSA STRONGLY recommends that you steal one
|
|
of these. (the chair-through-the-window-technique
|
|
is suggested).
|
|
|
|
|
|
!!!MOST IMPORTANT!!!!
|
|
|
|
The National Security Anarchists Release Of
|
|
"Area Sucking, Smashing Heroific Osculator: Lancaster Engineered"
|
|
|
|
I know the title is a bit of a mouthful, but the writer of the program (my
|
|
friend I was telling you about) insisted, so NSA finally gave in, and
|
|
released it under that name. This program has already been released to the
|
|
general public, and can be found on ANY worthwhile H/P/A/C/V/K/W board in the
|
|
country.
|
|
|
|
The interface between the components has been explained in detail with the
|
|
docs to that accompany the program. (we tried to think of an acronym for the
|
|
program, but were at a loss).
|
|
|
|
Well I guess thats pretty much it. I would explain how to use the program,
|
|
but it is SO painfully obvious once you load it in, I would feel like an
|
|
idiot spending precious disk space explaining it here.
|
|
|
|
NOTES: I would like to thank my friend (Lancaster) for thoughtfully
|
|
engineering this, and taking the time and energy to write the program
|
|
(he spent four LONG months doing so). I would also like to announce
|
|
with pride that this program is now Windows compatible, and soon will
|
|
be released for various other systems depending on the hardware that
|
|
is currently available on some systems. Thank you, and happy area
|
|
code killing.
|
|
|
|
|
|
Distribution Sites that Carry the:
|
|
Area Sucking, Smashing Heroific Osculator Software Lancaster Engineered
|
|
|
|
Bulletin Board Phone Number New User Password
|
|
+-----------------------+-----------------+-----------------+
|
|
| Homosexual Smurfs | D-(ONT)YOU-WISH | Sodomy |
|
|
| Bellcore Headquarters | 1-(619)PRI-VATE | Primusnet |
|
|
| Urkantus Recantictus | 1-(808)PRI-VATE | Password |
|
|
| Norad | 1-(203)748+3974 | <Classified> |
|
|
+-----------------------+-----------------+-----------------+
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
--=] National Security Anarchists [=--
|
|
--=] Volume I, Issue IV [=--
|
|
--=] Presents [=--
|
|
|
|
--=] The Serious Side of Hacking [=--
|
|
== The Place to be! ==
|
|
|
|
|
|
QSD is the place to be!
|
|
QSD for you and me!
|
|
Down with Lutz and the like
|
|
QSD is ALL I like
|
|
|
|
Getting codes,
|
|
good or bad.
|
|
Meeting girls, or be they fags?
|
|
Down with Lutz and the like
|
|
QSD is ALL I like
|
|
|
|
Careful watch what you say
|
|
keep those scanners far away
|
|
but thats half the fun, I do proclaim.
|
|
Death to those who say its lame!
|
|
Down with Lutz and the like
|
|
QSD is ALL I like
|
|
|
|
Are you chatting with a fed?
|
|
or is the guy a fag in drag?
|
|
It don't matter what you say,
|
|
just keep those scanners far away.
|
|
Down with Lutz and the like
|
|
QSD is ALL i like
|
|
|
|
Give your home phone away to all,
|
|
have them fags give you a call.
|
|
Real names are a must
|
|
friends at QSD you ALWAYS trust
|
|
Down with Lutz and the like
|
|
QSD is ALL i like
|
|
|
|
QSD is the place to be!
|
|
QSD for you and me!
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
|
|
--=] National Security Anarchists [=--
|
|
--=] Volume I, Issue IV [=--
|
|
--=] Presents [=--
|
|
--=] Info World [=--
|
|
|
|
We at NSA, decided that World News and Telco Briefs are basicly the same idea
|
|
divided up into two sections. Therefore resulting in the mixture of both,
|
|
Info World. This is where one can develop a good source of knowledge of
|
|
Teleco/Hacker Information. Here, one can see what new advancements have
|
|
taken place/problems have happened in the Teleco/Hacker World. Also one can
|
|
see and theorize how Ma Bell can use her new technology to destroy us. Even
|
|
if the idea is petty, but expand on that idea. We do tell you our views so
|
|
that hopefully Hackers/Phreakers will develop their own, be able to create
|
|
their own views/theories. To create that realization for him/herself, which
|
|
then creates a better understand of our Society and yourself. Do you limit
|
|
your imagination...
|
|
|
|
-------------------------------------------------------------------------------
|
|
-------------------------------------
|
|
== PAC Bell, NEC Sign SMDR Pact ==
|
|
== Telephony ==
|
|
-------------------------------------
|
|
|
|
Pacific Bell has inked an agreement to market NEC Technologies' Centrex-based
|
|
station message detail recording (SMDR) and call accounting equipment to it's
|
|
California Centrex customers.
|
|
|
|
The additional products are expected to help make Pacific Bell's Centrex
|
|
offering more attractive and competitive with customer premises-based network
|
|
solutions.
|
|
|
|
The NEC gear, known as Centrex Telemanagement, lets telecos offer call
|
|
accounting, traffic management, automated directory, facilities management,
|
|
and equipment and feature inventory through the central office. The
|
|
equipment can interface with AT&Ts 5ESS and 1AESS switches, Northern
|
|
Telecom's DMS-100, and NEC's own equipment, according to Susan Schneider,
|
|
product marketing specialist with Boxborough, Mass. based NEC Technologies.
|
|
|
|
|
|
-----------------------------------
|
|
== MCI Readies Data Platform ==
|
|
== Telephony ==
|
|
-----------------------------------
|
|
|
|
MCI has unveiled the platform that will bring its Virtual Private Data
|
|
Services (VPDS) into the future, as well as the first offering via platform:
|
|
a frame relay service.
|
|
|
|
At the International Communication Association show in Anaheim, California,
|
|
in the first week of June. MCI unveiled plans to deploy a nationwide,
|
|
cell-based network platform to support next generation broadband data
|
|
services under its VPDS umbrella. The first service offered on the platform,
|
|
frame relay, will be available in the second quarter of 1992., according to
|
|
Don Heath, MCI vice president for data marketing. The network also offers a
|
|
migration path to future services, including switched multimegabit data
|
|
service and asynchronous transfer mod-based broadband integrated services
|
|
digital network, he said.
|
|
|
|
"What MCI is offering is a clear migration path to tomorrow's communications
|
|
networks," Heath said. "We're opening the door to make broadband ISDN
|
|
services a reality."
|
|
|
|
The broadband platform will be cell-based, using 53-byte, fixed-sized data
|
|
packets. Initially, MCI will offer the data services on permanent virtual
|
|
circuits. Later, MCI will offer switched virtual circuits, which will
|
|
permit direct dial-up network with ISDN primary rate interface access.
|
|
Network access will be offered at 56Kb/s, fractional T-1 and T-1 speeds;
|
|
the backbone will operate at full T-1.
|
|
|
|
|
|
----------------------------------------
|
|
== AT&T Previews New Marine Cable ==
|
|
== Telephony ==
|
|
----------------------------------------
|
|
|
|
AT&T Submarine Systems will introduce a new undersea cable product line at
|
|
Telecom '91 in Geneva this October, the company said at the beginning of
|
|
June. Known now as the SL2000 cable system, the product will be renamed, and
|
|
a prototype exhibit will be on display at the show.
|
|
|
|
Although AT&T will design, install and maintain the system, the company has
|
|
been working with Kokusal Denshin Denwa of Japan for the past year to develop
|
|
optical amplifier technology for the SL2000 according to Debra Guancione,
|
|
product manager for AT&T Submarine Systems.
|
|
|
|
Current underseas systems require repeaters every 20 mile to 60 miles.
|
|
AT&T hopes to reach beyond 60 miles by the time the product becomes
|
|
available for service in 1995.
|
|
|
|
The cable system will package together bit rate-sensitive terminal equipment,
|
|
dispersion-shifted fiber, optically amplified repeaters and cable, all
|
|
configured according to customer requirements. It will offer rates of 5
|
|
Gb/s, 25 Gb/s or 622 Mb/s per fiber pair.
|
|
|
|
|
|
-----------------------------------
|
|
== Motorola and Pactel Trial ==
|
|
== Telephony ==
|
|
-----------------------------------
|
|
|
|
Motorola and PacTel Corporation will conduct field tests and market trails of
|
|
Code Division Multiple Access (CDMA) digital cellular technology. The trials
|
|
will take place in PacTel Cellular's Southern California service area. The
|
|
agreement follows more than a year and a half of CDMA testing already
|
|
conducted by the two companies. Among the activities planned for the trial
|
|
is the validation of Common Air Interface (CAI) specification. CDMA and TDMA
|
|
represent two competing technologies designed for migrating cellular systems
|
|
to a digital standard and increasing subscriber capacity.
|
|
|
|
|
|
--------------------------------
|
|
== Teleport Opts for ISDN ==
|
|
== Telephony ==
|
|
--------------------------------
|
|
|
|
TC Systems, a subsidiary of the Telport Communications Group, is now
|
|
providing local ISDN connectivity for Manhattan-based customers that need to
|
|
maintain ISDN links with both Europe and the far Esat. The first customer to
|
|
sign up for the new service is banking giant Citicorp, who will use it to
|
|
establish connections with London, Brussels, Dusseldorf, and Singapore. TC
|
|
Systems also operates one of the nations' largest ISDN "islands" consisting
|
|
of over 6000 BRI liens, currently being used by its parent company Merill
|
|
Lynch.
|
|
|
|
|
|
------------------------------------
|
|
== New York Tel Decentralizes ==
|
|
== Telephony ==
|
|
------------------------------------
|
|
|
|
New York Telephone is reorganizing along geographical lines, it disclosed
|
|
Friday. The goal is to bring services, "closer to our customers," a
|
|
spokesman said, but gave no exact date for full implementation of the new
|
|
organization.
|
|
|
|
The reorganization creates three geographic market areas, each under a group
|
|
vice president, Douglas Mello, previously president of Nynex Business
|
|
Information Systems, will be responsible for midtown and southern Manhattan
|
|
and for the company's special data services for its top 200 accounts. Arnold
|
|
Eckelman, former assistant vice president-operations, will be responsible for
|
|
norther Manhattan, the Bronx, Brooklyn, Queens and Staten Island. Particia
|
|
Higgins, formerly AT&T's vice president for international sales operations,
|
|
will head the company's Long Island, mid-state and upstate New York
|
|
operations.
|
|
|
|
The decentralization is necessary to respond to "enormous" changes in the
|
|
telecommunications marketplace, including increased competition, said Richard
|
|
Jalkut, president and CEO. The new organizations "will give us the
|
|
flexibility we need to respond to these changes," he said.
|
|
|
|
|
|
------------------------------------
|
|
== San Bernerdino Outage ==
|
|
== Internal GTE/AGCS Document ==
|
|
------------------------------------
|
|
|
|
|
|
On 6/19/91 at 7:34 P.M. San Bernardino, Ca. which serves 55,000 subscribers
|
|
experienced a 2 hour and 9 minute outage. This outage was caused by a fault
|
|
in the Space Switch Interface Controller (SIC). The SIC is the interface
|
|
between the APC/TPC's and the Space Switch portion of the Base Unit Network.
|
|
Without the SIC no call processing can take place since no network paths can
|
|
be established. The SIC portion of the GTD-5 is a duplex device and should
|
|
not cause a total outage. However, under certain double fault or backplane
|
|
fault conditions a duplex device can cause system outages.
|
|
|
|
San Bernardino has had a history of SIC problems, but none that had caused a
|
|
problem of this magnitude. During early 1990 West Area personal worked on
|
|
the SIC - and no problems were reported for 8 months.
|
|
|
|
Beginning 6/21/91 (after the latest outage) I have been working with AGCS and
|
|
West Area TSS personnel to resolve this problem. AGCS TAC and R&D personnel
|
|
were dispatched to the site to work with local personal on Saturday and
|
|
Sunday nights (6/22 and 6/23) to try and isolate the problem. While using a
|
|
scope to monitor certain suspect leads, a SMA syndrome similar to the
|
|
syndromes output during previous problems was output. No outage occurred.
|
|
Based upon this SMA being output when the pin was touched, a decision was
|
|
made to replace on of the wires that appeared to be very tight and could
|
|
possibly have "worn through" insulated or could have been pulling against
|
|
another pin. After replacing the wire AGCS and TSS personnel could not cause
|
|
the syndrome to be generated.
|
|
|
|
On 6/24/91 we held a meeting to assess the progress in resolving the problem.
|
|
At that time we could not get more than a 70 percent comfort level that the
|
|
fault that had caused the outage had been cleared by replacing the wire.
|
|
Inspection of the wire under a microscope has not displayed any flaws.
|
|
|
|
Based upon the risk that another outage could occur, TSS west and myself have
|
|
recommended that the SIC backplane be replaced as soon as possible. AGCS is
|
|
currently procuring the backplane. A decision has been made to use a roll
|
|
around/portable frame to house a temporary SIC while the backplane is being
|
|
replaced. The same concept used for the SVR 1641 16 Port BPC retrofit will
|
|
be used in San Bernardino to replace the SIC backplane. This process will
|
|
minimize the outage time caused by the changeout.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
|
|
--=] National Security Anarchists [=--
|
|
|
|
If you feel that you have talent in journalism and wish to have you
|
|
Name/Group appear in National Security Anarchists Newsletter, please send
|
|
your submissions to The Frayed Ends of Sanity 602/861+3167.
|
|
|
|
Submissions should fit under one of the following generalizations
|
|
|
|
System Operations Knowledge
|
|
System Programming
|
|
Telecommunication
|
|
Recent Hack/Phreak/Telco News Articles
|
|
Letters to the Editor
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
National Security Anarchists
|
|
"Plagiarism is the Basis of Creativity"
|
|
|
|
## ## ###### ######
|
|
### ## ## ## ##
|
|
###### ###### ######
|
|
## ### ## ## ##
|
|
## ## ###### ## ##
|
|
|
|
National Security Anarchists Members
|
|
|
|
Mind Rape
|
|
Dead Addict
|
|
I-Shence Master
|
|
Angel of Death
|
|
Dark Druid
|
|
Mci Sprinter
|
|
The Serpent
|
|
|
|
* NSA World Head Quarters *
|
|
The Frayed Ends of Sanity Unix System
|
|
602/861+3167
|
|
|
|
-------------------------------------------------------------------------------
|
|
National Security Anarchists
|
|
"Plagiarism is the Basis of Creativity"
|
|
All Rights Reserved
|
|
Any modifications to this text file is a violation of copyright
|
|
- (c) 1991 -
|
|
|
|
--------------------------------------------------------------------------------
|
|
|
|
Downloaded From P-80 Systems 304-744-2253
|
|
|
|
|
|
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+
|