--=] National Security Anarchists [=--
                         --=] Volume 1, Issue 1 [=--
                      --=] Date Released: 06/21/91 [=--



                            == NSA Introduction ==

   Welcome to National Security Anarchists (NSA) first Newsletter.  We are
 pretty much unlike other groups out there in that H/P wasteland.  We are more
 interested in providing new ideas, and new information.  Now everyone can
 scan, hack codes, hack unix.  Now in order to further these abilities we must
 take a look at the new technology that most of you have overlooked.  From
 just looking at these new ideas and concepts, you can develop you H/P skills
 even more.  Now the release of NSA Newsletter will come out when damn ready
 to.  Rush a newsletter, expect a shitty newsletter.  Plain and simple.
 Enjoy.

                              -- Your Editor --

-------------------------------------------------------------------------------
Table of Contents

Section  Subjects
-------- -----------------------------------------------------
  1.0    NSA Introduction
  1.1    Table of Contents
  1.2    Teleos Access Server, The Missing Switch?
  1.3    Teleos Escort
  1.4    Teleos Virtual Networking
  1.5    Advanced Communication Architectures and Techniques
  1.6    Network Facility Planning
  1.7    NSA World News
  1.8    Telco Briefs
  1.9    NSA Information

-------------------------------------------------------------------------------

                    --=] National Security Anarchists [=--
                         --=] Volume 1, Issue 1 [=--
                              --=] Presents [=--

               == Teleos Access Server, The Missing Switch? ==


   The Access Server is Customer Premises Equipment (CPE) located in the
 position formerly occupied by a T1 multiplexor.  The Access Server is a
 switch that allows simultaneous Bandwidth-On-Demand access to each of the 23
 64 Kbps B channels on the PRI interface.
   The Teleos Access Server was designed to add value through switched access
 to those emerging switched digital network services.  Specific interface
 cards are then added to the Access Server for each type of access (premises
 or netowrk) desired.  End users no longer need to provision T1 channels among
 voice, data, image, and videoconferencing.  Currently, network interfaces are
 available for T1 and PRI in all the protocol formats used by North American
 Inter-Exchange and Local Exchange Carriers.  Premises-side interfaces are
 availbable for T1, PRI, BRI, IBM token Ring and V.35 (through the Teleos
 Escort PRI TA).

   A Teleos Access Server will serve as the single point of switched digital
 network access from teh store.  Older PBXs will be connected to the Access
 Server via a Teleos T1 interface.  An IBM 3174 Controller and a workstation
 will be attached to the Token Ring.  All access from the store with the
 exception of local voice and local data calls will be via PRI.

   CICS applications such as Inventory, Pricing, Payroll, etc. willl run on an
 IBM Series 1 processor.  Both the Series 1 and the Token Ring will connect to
 a modem sharing device for access to a 9.6 Kbps leased line for SDLC access
 to an IBM 3090 host processor.  Credit card verifications for business
 customers will be directed to the Series 1 which permits access to the host.

   A key application driving the network architecture involes image transfer
 technology, which could lead to the presentation of high resolution images to
 the store's merchandiser to assist in selecting styles and colors of
 merchandise to make available in their stores.  The images can reside on the
 file server or the mainframe at the data center.  They are accessed using a
 high-resolution PC workstation with a graphical user interface.  In trails
 thus far, the call setup time through the IAP6000 Access Server hs been less
 then two seconds.

   The IAP6000 Access Server at the data center haso nly a Token Ring
 interface on the premises side, and is connected on the network side over a
 direct access PRI to MCI's DMS-250.

   Teleos Communications has forecast that using switched digital services
 rather than dedicated T1 network will save about 27% in recurring monthly
 network operating charges for this netowrk.

   Note:
       Teleos, together with Network Software Associates (NSA), is pleased to
     announce the availabbility of a PC-based 3270 emulation application. This
     product is compatible with IBM's new 3174 Establishment Controller
     equipped with the recently announced Basic Rate Interface (BRI) adapter.

       When used with these new IBM products, the Teleos/NSA soution allows
     ISA bus PCs to achieve 3270 terminal access and printer in an IBM S370 or
     S390 environment via local or remote cluster controllers.  The product
     solution consists of AdaptSNA 3270 Emulator software form NSA and Teleos'
     B101PC Terminal Adapter.

-------------------------------------------------------------------------------

                    --=] National Security Anarchists [=--
                         --=] Volume 1, Issue 1 [=--
                              --=] Presents [=--

                             == Teleos Escort ==
                          == Switching Interface ==

   The Teleos Escort is a Primary Rate Interface Terminal Adapter (PRI TA)
 that lets you leverage the power of the switched digital network by offering
 access to a wide variety of high-speed switches services.  These include AT&T
 ACCUNET Switched Digital Services (56,64,336,384, and 1536Kbps), MCI Vnet
 Switched 56, and U.S. Sprint VP 56.

   The Escort's unique Bandwith-On-Demand feature allows you to dial up
 network bandwidth for applications on an "as needed" basis.  You pay only for
 the bandwidth you use and access it only when you need it, resulting in a
 reduction in overall transmission costs.  This feature makes the Escort
 ideally suited for applications such as videoconferencing.

   The Escort supports dual standard RS366 dialing interfaces that let you
 access the direct dialing capabilities of video codecs.  The Escort also
 provides an interface for serial, synchronous host communication via dual
 V.35 or dual RS449/RS530.  Thus, by using the codec's keypad, you can easily
 establish a videoconference with a remote video codec.

   Escort options include an intergrated T1 Channel Service Unit (CSU), which
 allows direct connection to the T1 line without additional external
 equipment, and a Multi-Channel Synchronization feature, which provides the
 capablity to bundle 56/64 Kbps channels into n X 64 increments

   Simply put, the Escort allows you to link customers, suppliers, and
 strategic partner over Switched Digital Networks with the flexibility and
 cost efficiency of Bandwidth-On-Demand.

-------------------------------------------------------------------------------

                    --=] National Security Anarchists [=--
                         --=] Volume 1, Issue 1 [=--
                              --=] Presents [=--

                         == Teleos Virtual Networking ==
                    == Combining Private & Public Networks ==


   Teleos Access Servers give corporate end users the "best of both worlds":
 Virtual Private Networks (VPNs) and Hybrid Private Networks (HPN).  These
 networks deliver advance services over the more flexible and cost-effective
 public switched digital network.

   This emerging networking environment allows small and medium size
 businesses, as well as large corporations, to leverage the full menu of
 switched services for intra-and inter-enterprise networking applications.
 Among the advance virtual networking features enabled by an IAP6000 Access
 Server are multi-point.  Token Ring LAN bridging, distributed image
 communications, video conferencing services, intra/inter-bulk file transfer,
 and multi-vendor PBX interconnection.

   For companies considering switched networking or phasing out cumbersome,
 expensive private networks, the new features allow users to define a virtual
 networking environment, mixing both public and private leased lines to
 optimize network management resources, costs, and network traffic for more
 competivite decisions-making based on information access, flow, and
 distribution.  Virtual Networking offers the following advantages:


   o Just-In-Time Bandwidth Optimization

      Customers want dynamic bandwidth allocation on demand and want to pay
      for it when they need it. "Just-In-Case" based private networks do not
      offer this flexibility.

   o Information Sharing
      Virtual networking provides true information sharing with partners and
      customers by enabling simple and flexible network topologies for either
      vice, data networking, image, or videoconferencing.

   o Unlimited Network Redundancy
      Customers can use the built-in-redundancy of public Switched Digital
      Networks eliminating the need for building backup routes as required by
      proprietary private networks.

   o Choice of Carriers
      All major carriers offer Switched Digital Network services with an open
      standard switched access (i.e., ISDN PRI) enabling a global networking
      perspective for the first time.


-------------------------------------------------------------------------------

                    --=] National Security Anarchists [=--
                         --=] Volume 1, Issue 1 [=--
                              --=] Presents [=--

          == Advanced Communication Architectures and Techniques ==
                       == Advanced MSE Architectures ==
                            == GTE Project 534 ==


   This GTE Government Systems project has the broad, year 2000 objective
 to develop an advanced military tactical communication system
 architecture and software/hardware prototypes based on the most advanced
 field-qualified technologies.  The first year of this multiyear project
 effort was in the year 1990.

   First, a set of preliminary operational requirements was put together.
 The original objective for this project was for a MSE (mobile subscriber
 equipment) replacement, using the most modern technology, suitable for
 deployment in European terrain.  However, the most changes in the
 world's geopolitical scence required a more general perspective. The
 first operational requirements considered were the following:


  @ Radio access only --- no wirelines required.

  @ Moveability --- near-instantaneous take-down, set-up

  @ Security, privacy.

  @ Low probability of detection --- no radiation hotspots to reveal presence

  @ Jamming resistant.

  @ Ubiquitous low and medium band switching.  Selective broadband switching.

  @ Interoperability with other communication systems

  @ Survivability/reliability.

  @ Minimal size and weight.

  @ Position location.

  @ Dialing by spoken name or unit or number.


   A baseline architecture was conceived to meet these requirements.
 This architecture has the following capabilities:

  @ Phased array antennas permitting electronic variation of the
    number of beams and their gains.

  @ An all-radio interface using Spread Spectrum/Code Division
    Multiple Access (SS/CDMA) for the line side and trunk side signals.

  @ A single size Electronics Vehicle (EV) containing all system
    eletronics; radio transceivers, antennas, and switches.

   This architecture, in the principle, meets all the operational
 requirements.  The universal SS/CDMA meets those requirements
 relating to the radio interface.  The great mobility of this
 architecture allows communication to begin as soon as the vehicle
 stops.  The system self-configures, without prior planning.  The
 Electronic Vehicle nodes (Look at diagram below) seek EV identifies
 itself;  The mobile station's presence in the coverage zone of the
 new EV automatically promulgates to all other system nodes; any
 mobile station found can receive calls.

   In 1991, further definition of this baseline architecture, the
 consideration of different architectures, and the continuing
 assessment of applicable technologies, will continue.



                                                           __________
                                                  ____    /     *    \
                                _________        /    \  /      ?     \
 (EV)  Electronic Vehicle      /         \       \     \/       ?      |
                              /          /        \           >(EV)    \
 @     Personal Stations      \  *>>>    \        /*<      >>>>  ?      \
                              /    >>(EV)>>>      |  <    >      ?  >>* |
>,?,<  Radio Waves            \      ?   \ >>     |   <  >       ?  >   |
                              /   *>>?   /  >>>>  |    <>        ? >   /
                              \_________/      >>>>>>>(EV)>>>    ]   |
                                                    \       >>>>(EV)  /
                                                     \_____________  /
                                                                   \/

-------------------------------------------------------------------------------

                    --=] National Security Anarchists [=--
                         --=] Volume 1, Issue 1 [=--
                              --=] Presents [=--

                        == Network Facilities Planning ==
                              == GTE Project 446 ==


   The objective of this multiyear project is to develop advanced network
 planning systems that will assist planners in producing cost-effective
 facility expansion plans for the cellular networks used by GTE mobilnet
 and the interoffice networks used by the telcos.  The project aims to
 develop graphical, easy to use systems that employ state-of-the-art
 optimization algorithms, allowing the planners to use them interactively
 to evaluate several alternatives and generate cost-effective plans.

   During 1990, the research effort focused mainly on developing a
 facilities planning system for the cellular networks used by GTE
 Mobilnet.  This system comprised optimization algorithms for determining
 minimum-cost facility plans for the rapidly growing networks and
 cost-effective network topologies that provide a desired level of
 reliability.  The graphical interface for these algorithms is currently
 being developed using X-windows/Motif presentation graphics and the Unix
 operating system to ensure the portability of the tools to alternative
 hardware platforms, and the future compatibility with other planning
 systems.

   A related task, that originated in response to a request from the GTE
 Government Systems staff working on the Airfone ][ project, focused on
 the design of the terrestrail facility network that connects the ground
 stations to the Airfone switches.


INTERCONNECT FACILITIES PLANNING SYSTEM FOR GTE MOBILNET

   Mobile telephone services are expected to be one of the fastest
 growing areas of telecommunications over the next decade, and this rapid
 growth in the customer base will require a corresponding growth in the
 network facilities.  A fundamental problem that arises in designing the
 facilities network for a cellular system is to determine how to expand
 the capacity of the facilities over a given planning time horizon to
 meet projected demand at minimum cost.  The transmission facilities used
 in the cellular systems are either privately owned (e.g. microwave) or
 leased from the local telcos (T1s, fiber).  The capacity expansion plan
 has to determine where and when to place concentrators in the network,
 what type of concentrators to use, which cell sites to connect to each
 of the hubs, which cells to connect directly to the Mobil Telephone
 Switching Office, and what facilities to use on each of the links.
 Optimizaion algorithms were developed to address these questions, and
 the graphical interface for the system is currently under development.
 In addition, preliminary work was completed on alogorithms to determine
 the network topology that should be deployed to survive any single link
 failure.  A prototype system was presented to the Mobilnet staff for
 feedback and is currently under revision.  The transfer of the
 alpha-version to Mobilnet is expected in the first half of 1991.

   Figure Below illustrates the output of the prototype system.  This is
 the final design toplolgy for a representative network; it shows where
 the concentrators should be located and how the cell sites should be
 connected to the hubs and to the Mobil Telephone Switching Office
 located at Warrensville Heights, Ohio.



        Final design topology for a representative cellular network
       -------------------------------------------------------------

                                            o
    o       o                           o_  |  /---o
     \_    /  o                           \_|_/
       \__/_/                           _/- O_ Pine Ridge
        _O/  Cleveland                _/   /  \_
      _/   \_                        o    /     o
    _/       \_                          /
  _/           \_                       /         o_      o   o
 o               \_                    /            \_    |  /
                   \_     o_  o       /               \_  | /
       o             \_     \_ \     /                  \_|/
        \_______       \______\ \   /        /------------O Bainbridge
                \_             \ \ //--------             |
      o-----------O---------------@/ Warrensville Heights |
                _/ Lakewood    _/ |\\-----\_              |
              _/             _/   | \_      \             o
            _/             _/     |   \-------O Chardon
           o             _/       |        \_
                       _/         |          \_
                     _/           |   o        \_
                   _O Berea       |  /           \_        o
                 _/               | /              \_      |
               _/                 |/                 \_    o
              /             o-----O Shaker Heights  o  \_  |
            o                   _/ \_                \   \ |
                              _/     o                \---_O_ South Russell
                             /                          _/ | \_
                            o                         _/   o   \_
                                                     o           o

 Key
-----------------------------
 @ - Main Switch Distributor
 O - Inner Switch Distributor
 o - Outer Switch Distributor


FACILITIES PLANNING FOR THE TERRESTRIAL NETWORK FOR AIRFONE ][

   Due to the advent of new technology and the expected increase in
 demand for air-to-ground telecommunications services, GTE Airfone is
 currently considering the design and implementation of a new system,
 called Airfone ][.  One of the questions that arises in the design of
 the new system is, given the locations of the ground stations and their
 busy-hour traffic forecast, where should switches that provide the
 connection to the public-switches in order to minimize the overall cost
 of the switches and the interconnect facilities.

   To evaluate the impact of increasing the number of switches on the
 cost of the interconnect facilities, this study considered five design
 scenarios: 2, 4, 6, 8, and 10 switches, with one switch always fixed at
 Chicago.  The study was carried out in two stages.  In the first stage,
 a mathematical model was used to determine the optimum locations for the
 switches, assuming that the ground stations would be connected directly
 to the switches (i.e., a star topology).  Given a switch location and
 the ground stations it will serve, the second stage determined a
 minimun-cost topology to connect the ground stations to this swtich.
 This topology allowed multiplexing and took advantage of the economies
 of scale offered by the structure of the DS0 and DS1 tariffs and was
 determined using a private network design tool, CAPT1N, developed at GTE
 Laboratories during 1989 as part of Network Facilities Planning project.
 The results of the second stage indicated the cost saving that result
 from multiplexing for each cluster of switch and gorund stations to be
 served by the switch.  The results of this study can now be used to
 evaluate the tradeoff between the cost of the swithces and the cost of
 the interconnect facilities to determine the number of switches that
 should be placed in the network.  Figure below illustrates the network
 topology with multiplexing for the four-switch scenario and the switch
 at Chicago, transimiting to cells.


         Minimum-cost network: Four-Switch scnario/Chicago as a Hub
        ------------------------------------------------------------

                o                     o_
                |                       \_
                |                         \_
                |                           \_
                |                             \_
                |              o---------------o----------------------o
                |                            _/                       |
                |                          _/                         |
                |                        _/                           |
                |       o Minneapolis  _/                             |
                |     _/             _/                               |
                |   _/     Chicago  /         o Detroit               |
                | _/       _/-----@______      \                      o
                |/       _/    _//|\_    \------o                 Cleveland
                o-------/    _/ / |  \_
                           _/  |  |    \_
                         _/   _|  |_     \_
                       _/     |    |_      \_            Dayton
       Kansas City    /       |     |_       \_            o
            o       /         |_     |_        \_        _/   o Cincinatti
             \_   /            o      |_         \_    _/   _/
               \/               \_     |_          \__/    /
               o                  o     |_           o ----
                               St. Louis |
                                         |
                                         |  o Nashville
                                         o-/
                                       _/
                                     _/
                                   _/
                                  o

 Key
-----------------------------
 @ - Main Switch Distributor
 o - Distribution Switches


-------------------------------------------------------------------------------

                    --=] National Security Anarchists [=--
                         --=] Volume 1, Issue 1 [=--
                              --=] Presents [=--
                             --=] World News [=--

   Welcome to NSA World News.  The next few articles tell of some of the more
 recent Hack/Phreak and other activities as well.  I wish for you all to sit
 back and have a few laughs on how the media portrays our society.  Funny,
 hackers didn't get a bad name until, well until media got involved. Hmmmm,
 makes you wonder doesn't it.  Read on.

-------------------------------------------------------------------------------

                    --=] National Security Anarchists [=--
                         --=] Volume 1, Issue 1 [=--
                              --=] Presents [=--
                             --=] World News [=--

                        "Nazi Video Games Circulating"
                                  Written by
                              Los Angeles Times


    LOS ANGELES ---- Undergound computer-video games circulating among
  Austrain and German students test the ability to manage a Nazi death
  camp and to distinguish between Aryans and Jews, a Holocaust study
  center says.
    Eight copies of the programs, designed for home computers, were
  obtained by the Simon Wiesenthal Center in Los Angeles.  The center
  demonstrated two of the programs for The Associated Press on Monday.

    Rabbi Abraham Cooper, the center's associate dean, said the
  programs are based on the Holocaust but often substitute Turks, many
  of whom work in Germany, for Jews.

    In one program, "KZ Manager", the player must sell gold fillings,
  lampshades and labor to earn enough money to buy gas and add gas
  chambers to kill Turks at the Treblinka death camp.  "KZ" is an
  abbreviation of the German word for con- centration camp.

    The player must correctly answer questions about Turks or be taken
  by a Grim Reaper figure to the Buchenwald death camp.

    What yo uwant to do now if you love playing computer games, you
  want to go right back in adn you want to win," Cooper said.  "It's a
  very shrewd psychology in terms of the design of the game"

    Reports of the games have circulated for several years, but they
  were not believed to be widespread until a recent surge of reports in
  the Austrian media, he said.

    Newspapers reported that a poll of students in one Austrian city
  said that nearly 40 percent knew of the games and more than 20
  percent had seen them, Cooper said.

    The game "Aryan Test" says it is by Adolf Hitler Software Ltd.  The
  game "Anti-Turk Test" says it was made in Buchenwald by Hitler & Hess.

    Distribution has been by electronic mail,  under-the-counter sales, word
  of mouth and in deceptive packaging on store shelves.  Cooper said the
  packaging of the "KZ Manager" game resembles "some sort of money game."

    Cooper believes the games are the work of neo-Nazi propagandists (*** Yea
  it's probably out own fucking gov't too ***) seeking youthful followers
  through a technology largely unfamiliar to their parents.

    "Not shocking to anybody, the kids are way ahead of the adults, and this
  is one area where the Nazis, the fascists, have found a way in," he said.

-------------------------------------------------------------------------------

                    --=] National Security Anarchists [=--
                         --=] Volume 1, Issue 1 [=--
                              --=] Presents [=--
                             --=] World News [=--

                  "Nazi-Games Maker Target of Reward Offer"
                                 Written by
                              Associated Press


    LOS ANGELES --- The Simon Wiesenthal Center offerd a $25,00 reward
  Friday in hopes of finding the maker of neo-Nazi video games that
  have been circulating in Europe.  It asked the German government to
  match the sum.

    "We believe that this would demonstrate a seriousness to finally
  bringing these culprits to justice," said Rabbi Marvin Hier, dean of
  the Los Angeles-based Holocaust research center.  The reward was
  offered for information leading to a conviction.

    The underground games, which are in German, have strong anti-Jewish
  and anti-Turkish themes.  In one program, KZ Manager, the player must
  sell gold filings, lampshades and labor to earn money to buy gas and
  gas chambers to kill Turks at the Treblinka death camp.  "KZ" is an
  abbreviation of the German word for concentration camp.

    The reward was triggered by a telegram sent by German Chancellor
  Helmut Kohl to Sen. Alfonse D'Amato, R-N.Y., on Thursday and
  forwarded to the Wiesenthal Center.

    D'Amato last week wrote to Kohl and Austrain President Kurt
  Waldheim, asking them to prevent distribution of the games after the
  center publicized their apparent spread in Germany, Austria, and the
  Netherlands.  D'Amota's letters cited provisions of the Austrain and
  German criminal codes that forbid inciting racial hatred.

    Word of the games has circulated for several years, but reports in
  the Austrain media indicate they are becoming more widespread, said
  Rabbi Abraham Cooper, the center's associate dean.

    In a translated copy of the telegram, Kohl told D'Amato that he is
  disgusted by the games but indicated that the problem has already
  passed.

    "As far as can be ascertained, these products have not appeard
  since early 1990," Kohl said.  "Before that, some of these evil items
  had emerged, but they were not sold over the counter in normal
  stores."

    He said that the games were confiscated when found but that the
  manufactuer has not been identified.

--------------------------------------------------------------------------------

                    --=] National Security Anarchists [=--
                         --=] Volume 1, Issue 1 [=--
                              --=] Presents [=--
                             --=] World News [=--

                            "'Cracker' Speaks Out"
                                 Written by:
                                 UNIX Today!


   New York--A man identifying himself as as one of the Dutch crackers
   who was filmed breaking into U.S. computers by Dutch television said
   last week he found the break-ins to be easy to do. He also said he
   doesn't believe he did anything wrong. "A guest account is a guest
   account.  I considered myself a guest on the system," said a man who
   identified himself only as "Hank." Last Wednesday, Hank, who said he
   was 24 years old, gave a telephone interview to Emmanuel Goldstein,
   editor of the cracker journal 2600.  The interview aired on
   Goldstein's radio program "Off the Hook," on WBAI-FM, a publicly
   funded New York alternative radio station.

     There was no conclusive evidence to indicate whether Hank was
   genuine, though some details he gave matched those given out by
   victims of the Dutch crackers and by people with contacts in the
   cracker community.  Hank spoke English with a slight accent.

     He would not discuss specifics of sites broken into, how he got in
   or what he found once he was there.

     Hank said the cracking is its own reward, and when he's logged
   into a system, he's interested only in the system itself, not the
   data on it.  One radio caller asked whether he'd ever gained access
   to politicaly interesting information. "When i get onto a system,
   I'm not interested in the stuff there," he said.  "I'm not
   interested in going throught love letters or anything else."

     He said if he had access to classified information---something
   authorities say he did not have--it's the user's fault. "I think
   it's pretty stupid to put classified data on a public network," he
   said.

     Hank said he believes computer laws will not control cracking. "I
   think it's not a solution to prohibit hacking, because the people
   will go underground," he said.

     Hank said he has been cracking about three years, and specializes
   in breaking into Unix systems.

     At first, he contacted systems administrators of systems he
   cracked to alert them to problems.  Some of them seemed to want to
   use the information to correct the problem, but many seemed more
   interested in hunting him down, he said.  And those were the ones
   most likely to leave security holes uncorrected, he added.

     He said he searched for default log-ins that were shipped with
   systems by the manufacturer, and often not changed by users.
   Goldstein would not comment on how he got in touch with Hank. "I run
   a hacking publication, and there's one in Holland," he said. He said
   he believes Hank to be authentic.  "Holland isn't that big a place.
   Everybody knows what everybody else is doing.

-------------------------------------------------------------------------------

                    --=] National Security Anarchists [=--
                         --=] Volume 1, Issue 1 [=--
                              --=] Presents [=--
                           --=] Teleco Briefs [=--

   These are brief bits of Teleco information.  You may say so fucking what,
 let's learn how to hack this and that.  Well go ahead and do that, you won't
 get anywhere.  Well unless you take the time to realize the dangers that
 Ma Bell is doing to stop us.

-------------------------------------------------------------------------------

                     ------------------------------------
                       Teleos Acquires Vadis Technology
                     ------------------------------------

   Teleos Communicaitons, Inc., the leading manufacturer of PC-based terminal
 adapters (PC TA) for ISDN connectivity, has purchased the technology of
 Vadis, Inc. of Richardson, Texas.  The agreement includes a complete
 technology transfer of Vadis' Microchannel PC TA architecture.  Teleos' own
 PC TA product, the B101PC, is an IBM PC XT/AT-compatible adapter.  The
 acquistion will stregthen Teleos' leading market position and will enable
 Teleos to broaden its offerings in the low end ofthe PC TA marketplace.



              --------------------------------------------------
                ISDN Products to Reach Eastern European Market
              --------------------------------------------------

   Teleos has appointed Internet its exclusive distributor in Hungary to
 market the full line of Teleos ISDN customer premises equipment products in
 that country.  Teleos intend to provide global corporate networking solutions
 to multinational companies by leveraging the public switched environment,
 such as ISDN.  In 1990, Teles demonstrated internation ISDN links with Japan
 and France.  Internet is Teleos' first European distributor.



                    -------------------------------------
                      Teleos Leasing Corporation Formed
                    -------------------------------------

   Users of the emerging ISDN now have the opportunity to finance ISDN Access
 Server Systems supplied yb Teleos Communications, Inc., through Teleos
 leasing Cororation (TLC), a joint venture captive finace company recently
 formed by Teleos and Communication Financial Corporation (CFC).  Teleos and
 CFC are the sole shareholders of Teleos Leasing Corporation.  CFC will
 provide funding and management services for TLC, which operates as a Teleos
 affiliate and CFC subsidiary.

-------------------------------------------------------------------------------

                         National Security Anarchists
                    "Plagurism is the Basis of Creativity"

                                ##  ## ###### ######
                               ### ## ##     ##  ##
                              ###### ###### ######
                             ## ###     ## ##  ##
                            ##  ## ###### ##  ##

-------------------------------------------------------------------------------
                         National Security Anarchists
                    "Plagurism is the Basis of Creativity"
                             All Rights Reserved
       Any modifications to this text file is a violation of copyright
                                 - (c) 1991 -
--------------------------------------------------------------------------------
Downloaded From P-80 Systems 304-744-2253

Downloaded From P-80 International Information Systems 304-744-2253 12yrs+