--=] National Security Anarchists [=-- --=] Volume 1, Issue 1 [=-- --=] Date Released: 06/21/91 [=-- == NSA Introduction == Welcome to National Security Anarchists (NSA) first Newsletter. We are pretty much unlike other groups out there in that H/P wasteland. We are more interested in providing new ideas, and new information. Now everyone can scan, hack codes, hack unix. Now in order to further these abilities we must take a look at the new technology that most of you have overlooked. From just looking at these new ideas and concepts, you can develop you H/P skills even more. Now the release of NSA Newsletter will come out when damn ready to. Rush a newsletter, expect a shitty newsletter. Plain and simple. Enjoy. -- Your Editor -- ------------------------------------------------------------------------------- Table of Contents Section Subjects -------- ----------------------------------------------------- 1.0 NSA Introduction 1.1 Table of Contents 1.2 Teleos Access Server, The Missing Switch? 1.3 Teleos Escort 1.4 Teleos Virtual Networking 1.5 Advanced Communication Architectures and Techniques 1.6 Network Facility Planning 1.7 NSA World News 1.8 Telco Briefs 1.9 NSA Information ------------------------------------------------------------------------------- --=] National Security Anarchists [=-- --=] Volume 1, Issue 1 [=-- --=] Presents [=-- == Teleos Access Server, The Missing Switch? == The Access Server is Customer Premises Equipment (CPE) located in the position formerly occupied by a T1 multiplexor. The Access Server is a switch that allows simultaneous Bandwidth-On-Demand access to each of the 23 64 Kbps B channels on the PRI interface. The Teleos Access Server was designed to add value through switched access to those emerging switched digital network services. Specific interface cards are then added to the Access Server for each type of access (premises or netowrk) desired. End users no longer need to provision T1 channels among voice, data, image, and videoconferencing. Currently, network interfaces are available for T1 and PRI in all the protocol formats used by North American Inter-Exchange and Local Exchange Carriers. Premises-side interfaces are availbable for T1, PRI, BRI, IBM token Ring and V.35 (through the Teleos Escort PRI TA). A Teleos Access Server will serve as the single point of switched digital network access from teh store. Older PBXs will be connected to the Access Server via a Teleos T1 interface. An IBM 3174 Controller and a workstation will be attached to the Token Ring. All access from the store with the exception of local voice and local data calls will be via PRI. CICS applications such as Inventory, Pricing, Payroll, etc. willl run on an IBM Series 1 processor. Both the Series 1 and the Token Ring will connect to a modem sharing device for access to a 9.6 Kbps leased line for SDLC access to an IBM 3090 host processor. Credit card verifications for business customers will be directed to the Series 1 which permits access to the host. A key application driving the network architecture involes image transfer technology, which could lead to the presentation of high resolution images to the store's merchandiser to assist in selecting styles and colors of merchandise to make available in their stores. The images can reside on the file server or the mainframe at the data center. They are accessed using a high-resolution PC workstation with a graphical user interface. In trails thus far, the call setup time through the IAP6000 Access Server hs been less then two seconds. The IAP6000 Access Server at the data center haso nly a Token Ring interface on the premises side, and is connected on the network side over a direct access PRI to MCI's DMS-250. Teleos Communications has forecast that using switched digital services rather than dedicated T1 network will save about 27% in recurring monthly network operating charges for this netowrk. Note: Teleos, together with Network Software Associates (NSA), is pleased to announce the availabbility of a PC-based 3270 emulation application. This product is compatible with IBM's new 3174 Establishment Controller equipped with the recently announced Basic Rate Interface (BRI) adapter. When used with these new IBM products, the Teleos/NSA soution allows ISA bus PCs to achieve 3270 terminal access and printer in an IBM S370 or S390 environment via local or remote cluster controllers. The product solution consists of AdaptSNA 3270 Emulator software form NSA and Teleos' B101PC Terminal Adapter. ------------------------------------------------------------------------------- --=] National Security Anarchists [=-- --=] Volume 1, Issue 1 [=-- --=] Presents [=-- == Teleos Escort == == Switching Interface == The Teleos Escort is a Primary Rate Interface Terminal Adapter (PRI TA) that lets you leverage the power of the switched digital network by offering access to a wide variety of high-speed switches services. These include AT&T ACCUNET Switched Digital Services (56,64,336,384, and 1536Kbps), MCI Vnet Switched 56, and U.S. Sprint VP 56. The Escort's unique Bandwith-On-Demand feature allows you to dial up network bandwidth for applications on an "as needed" basis. You pay only for the bandwidth you use and access it only when you need it, resulting in a reduction in overall transmission costs. This feature makes the Escort ideally suited for applications such as videoconferencing. The Escort supports dual standard RS366 dialing interfaces that let you access the direct dialing capabilities of video codecs. The Escort also provides an interface for serial, synchronous host communication via dual V.35 or dual RS449/RS530. Thus, by using the codec's keypad, you can easily establish a videoconference with a remote video codec. Escort options include an intergrated T1 Channel Service Unit (CSU), which allows direct connection to the T1 line without additional external equipment, and a Multi-Channel Synchronization feature, which provides the capablity to bundle 56/64 Kbps channels into n X 64 increments Simply put, the Escort allows you to link customers, suppliers, and strategic partner over Switched Digital Networks with the flexibility and cost efficiency of Bandwidth-On-Demand. ------------------------------------------------------------------------------- --=] National Security Anarchists [=-- --=] Volume 1, Issue 1 [=-- --=] Presents [=-- == Teleos Virtual Networking == == Combining Private & Public Networks == Teleos Access Servers give corporate end users the "best of both worlds": Virtual Private Networks (VPNs) and Hybrid Private Networks (HPN). These networks deliver advance services over the more flexible and cost-effective public switched digital network. This emerging networking environment allows small and medium size businesses, as well as large corporations, to leverage the full menu of switched services for intra-and inter-enterprise networking applications. Among the advance virtual networking features enabled by an IAP6000 Access Server are multi-point. Token Ring LAN bridging, distributed image communications, video conferencing services, intra/inter-bulk file transfer, and multi-vendor PBX interconnection. For companies considering switched networking or phasing out cumbersome, expensive private networks, the new features allow users to define a virtual networking environment, mixing both public and private leased lines to optimize network management resources, costs, and network traffic for more competivite decisions-making based on information access, flow, and distribution. Virtual Networking offers the following advantages: o Just-In-Time Bandwidth Optimization Customers want dynamic bandwidth allocation on demand and want to pay for it when they need it. "Just-In-Case" based private networks do not offer this flexibility. o Information Sharing Virtual networking provides true information sharing with partners and customers by enabling simple and flexible network topologies for either vice, data networking, image, or videoconferencing. o Unlimited Network Redundancy Customers can use the built-in-redundancy of public Switched Digital Networks eliminating the need for building backup routes as required by proprietary private networks. o Choice of Carriers All major carriers offer Switched Digital Network services with an open standard switched access (i.e., ISDN PRI) enabling a global networking perspective for the first time. ------------------------------------------------------------------------------- --=] National Security Anarchists [=-- --=] Volume 1, Issue 1 [=-- --=] Presents [=-- == Advanced Communication Architectures and Techniques == == Advanced MSE Architectures == == GTE Project 534 == This GTE Government Systems project has the broad, year 2000 objective to develop an advanced military tactical communication system architecture and software/hardware prototypes based on the most advanced field-qualified technologies. The first year of this multiyear project effort was in the year 1990. First, a set of preliminary operational requirements was put together. The original objective for this project was for a MSE (mobile subscriber equipment) replacement, using the most modern technology, suitable for deployment in European terrain. However, the most changes in the world's geopolitical scence required a more general perspective. The first operational requirements considered were the following: @ Radio access only --- no wirelines required. @ Moveability --- near-instantaneous take-down, set-up @ Security, privacy. @ Low probability of detection --- no radiation hotspots to reveal presence @ Jamming resistant. @ Ubiquitous low and medium band switching. Selective broadband switching. @ Interoperability with other communication systems @ Survivability/reliability. @ Minimal size and weight. @ Position location. @ Dialing by spoken name or unit or number. A baseline architecture was conceived to meet these requirements. This architecture has the following capabilities: @ Phased array antennas permitting electronic variation of the number of beams and their gains. @ An all-radio interface using Spread Spectrum/Code Division Multiple Access (SS/CDMA) for the line side and trunk side signals. @ A single size Electronics Vehicle (EV) containing all system eletronics; radio transceivers, antennas, and switches. This architecture, in the principle, meets all the operational requirements. The universal SS/CDMA meets those requirements relating to the radio interface. The great mobility of this architecture allows communication to begin as soon as the vehicle stops. The system self-configures, without prior planning. The Electronic Vehicle nodes (Look at diagram below) seek EV identifies itself; The mobile station's presence in the coverage zone of the new EV automatically promulgates to all other system nodes; any mobile station found can receive calls. In 1991, further definition of this baseline architecture, the consideration of different architectures, and the continuing assessment of applicable technologies, will continue. __________ ____ / * \ _________ / \ / ? \ (EV) Electronic Vehicle / \ \ \/ ? | / / \ >(EV) \ @ Personal Stations \ *>>> \ /*< >>>> ? \ / >>(EV)>>> | < > ? >>* | >,?,< Radio Waves \ ? \ >> | < > ? > | / *>>? / >>>> | <> ? > / \_________/ >>>>>>>(EV)>>> ] | \ >>>>(EV) / \_____________ / \/ ------------------------------------------------------------------------------- --=] National Security Anarchists [=-- --=] Volume 1, Issue 1 [=-- --=] Presents [=-- == Network Facilities Planning == == GTE Project 446 == The objective of this multiyear project is to develop advanced network planning systems that will assist planners in producing cost-effective facility expansion plans for the cellular networks used by GTE mobilnet and the interoffice networks used by the telcos. The project aims to develop graphical, easy to use systems that employ state-of-the-art optimization algorithms, allowing the planners to use them interactively to evaluate several alternatives and generate cost-effective plans. During 1990, the research effort focused mainly on developing a facilities planning system for the cellular networks used by GTE Mobilnet. This system comprised optimization algorithms for determining minimum-cost facility plans for the rapidly growing networks and cost-effective network topologies that provide a desired level of reliability. The graphical interface for these algorithms is currently being developed using X-windows/Motif presentation graphics and the Unix operating system to ensure the portability of the tools to alternative hardware platforms, and the future compatibility with other planning systems. A related task, that originated in response to a request from the GTE Government Systems staff working on the Airfone ][ project, focused on the design of the terrestrail facility network that connects the ground stations to the Airfone switches. INTERCONNECT FACILITIES PLANNING SYSTEM FOR GTE MOBILNET Mobile telephone services are expected to be one of the fastest growing areas of telecommunications over the next decade, and this rapid growth in the customer base will require a corresponding growth in the network facilities. A fundamental problem that arises in designing the facilities network for a cellular system is to determine how to expand the capacity of the facilities over a given planning time horizon to meet projected demand at minimum cost. The transmission facilities used in the cellular systems are either privately owned (e.g. microwave) or leased from the local telcos (T1s, fiber). The capacity expansion plan has to determine where and when to place concentrators in the network, what type of concentrators to use, which cell sites to connect to each of the hubs, which cells to connect directly to the Mobil Telephone Switching Office, and what facilities to use on each of the links. Optimizaion algorithms were developed to address these questions, and the graphical interface for the system is currently under development. In addition, preliminary work was completed on alogorithms to determine the network topology that should be deployed to survive any single link failure. A prototype system was presented to the Mobilnet staff for feedback and is currently under revision. The transfer of the alpha-version to Mobilnet is expected in the first half of 1991. Figure Below illustrates the output of the prototype system. This is the final design toplolgy for a representative network; it shows where the concentrators should be located and how the cell sites should be connected to the hubs and to the Mobil Telephone Switching Office located at Warrensville Heights, Ohio. Final design topology for a representative cellular network ------------------------------------------------------------- o o o o_ | /---o \_ / o \_|_/ \__/_/ _/- O_ Pine Ridge _O/ Cleveland _/ / \_ _/ \_ o / o _/ \_ / _/ \_ / o_ o o o \_ / \_ | / \_ o_ o / \_ | / o \_ \_ \ / \_|/ \_______ \______\ \ / /------------O Bainbridge \_ \ \ //-------- | o-----------O---------------@/ Warrensville Heights | _/ Lakewood _/ |\\-----\_ | _/ _/ | \_ \ o _/ _/ | \-------O Chardon o _/ | \_ _/ | \_ _/ | o \_ _O Berea | / \_ o _/ | / \_ | _/ |/ \_ o / o-----O Shaker Heights o \_ | o _/ \_ \ \ | _/ o \---_O_ South Russell / _/ | \_ o _/ o \_ o o Key ----------------------------- @ - Main Switch Distributor O - Inner Switch Distributor o - Outer Switch Distributor FACILITIES PLANNING FOR THE TERRESTRIAL NETWORK FOR AIRFONE ][ Due to the advent of new technology and the expected increase in demand for air-to-ground telecommunications services, GTE Airfone is currently considering the design and implementation of a new system, called Airfone ][. One of the questions that arises in the design of the new system is, given the locations of the ground stations and their busy-hour traffic forecast, where should switches that provide the connection to the public-switches in order to minimize the overall cost of the switches and the interconnect facilities. To evaluate the impact of increasing the number of switches on the cost of the interconnect facilities, this study considered five design scenarios: 2, 4, 6, 8, and 10 switches, with one switch always fixed at Chicago. The study was carried out in two stages. In the first stage, a mathematical model was used to determine the optimum locations for the switches, assuming that the ground stations would be connected directly to the switches (i.e., a star topology). Given a switch location and the ground stations it will serve, the second stage determined a minimun-cost topology to connect the ground stations to this swtich. This topology allowed multiplexing and took advantage of the economies of scale offered by the structure of the DS0 and DS1 tariffs and was determined using a private network design tool, CAPT1N, developed at GTE Laboratories during 1989 as part of Network Facilities Planning project. The results of the second stage indicated the cost saving that result from multiplexing for each cluster of switch and gorund stations to be served by the switch. The results of this study can now be used to evaluate the tradeoff between the cost of the swithces and the cost of the interconnect facilities to determine the number of switches that should be placed in the network. Figure below illustrates the network topology with multiplexing for the four-switch scenario and the switch at Chicago, transimiting to cells. Minimum-cost network: Four-Switch scnario/Chicago as a Hub ------------------------------------------------------------ o o_ | \_ | \_ | \_ | \_ | o---------------o----------------------o | _/ | | _/ | | _/ | | o Minneapolis _/ | | _/ _/ | | _/ Chicago / o Detroit | | _/ _/-----@______ \ o |/ _/ _//|\_ \------o Cleveland o-------/ _/ / | \_ _/ | | \_ _/ _| |_ \_ _/ | |_ \_ Dayton Kansas City / | |_ \_ o o / |_ |_ \_ _/ o Cincinatti \_ / o |_ \_ _/ _/ \/ \_ |_ \__/ / o o |_ o ---- St. Louis | | | o Nashville o-/ _/ _/ _/ o Key ----------------------------- @ - Main Switch Distributor o - Distribution Switches ------------------------------------------------------------------------------- --=] National Security Anarchists [=-- --=] Volume 1, Issue 1 [=-- --=] Presents [=-- --=] World News [=-- Welcome to NSA World News. The next few articles tell of some of the more recent Hack/Phreak and other activities as well. I wish for you all to sit back and have a few laughs on how the media portrays our society. Funny, hackers didn't get a bad name until, well until media got involved. Hmmmm, makes you wonder doesn't it. Read on. ------------------------------------------------------------------------------- --=] National Security Anarchists [=-- --=] Volume 1, Issue 1 [=-- --=] Presents [=-- --=] World News [=-- "Nazi Video Games Circulating" Written by Los Angeles Times LOS ANGELES ---- Undergound computer-video games circulating among Austrain and German students test the ability to manage a Nazi death camp and to distinguish between Aryans and Jews, a Holocaust study center says. Eight copies of the programs, designed for home computers, were obtained by the Simon Wiesenthal Center in Los Angeles. The center demonstrated two of the programs for The Associated Press on Monday. Rabbi Abraham Cooper, the center's associate dean, said the programs are based on the Holocaust but often substitute Turks, many of whom work in Germany, for Jews. In one program, "KZ Manager", the player must sell gold fillings, lampshades and labor to earn enough money to buy gas and add gas chambers to kill Turks at the Treblinka death camp. "KZ" is an abbreviation of the German word for con- centration camp. The player must correctly answer questions about Turks or be taken by a Grim Reaper figure to the Buchenwald death camp. What yo uwant to do now if you love playing computer games, you want to go right back in adn you want to win," Cooper said. "It's a very shrewd psychology in terms of the design of the game" Reports of the games have circulated for several years, but they were not believed to be widespread until a recent surge of reports in the Austrian media, he said. Newspapers reported that a poll of students in one Austrian city said that nearly 40 percent knew of the games and more than 20 percent had seen them, Cooper said. The game "Aryan Test" says it is by Adolf Hitler Software Ltd. The game "Anti-Turk Test" says it was made in Buchenwald by Hitler & Hess. Distribution has been by electronic mail, under-the-counter sales, word of mouth and in deceptive packaging on store shelves. Cooper said the packaging of the "KZ Manager" game resembles "some sort of money game." Cooper believes the games are the work of neo-Nazi propagandists (*** Yea it's probably out own fucking gov't too ***) seeking youthful followers through a technology largely unfamiliar to their parents. "Not shocking to anybody, the kids are way ahead of the adults, and this is one area where the Nazis, the fascists, have found a way in," he said. ------------------------------------------------------------------------------- --=] National Security Anarchists [=-- --=] Volume 1, Issue 1 [=-- --=] Presents [=-- --=] World News [=-- "Nazi-Games Maker Target of Reward Offer" Written by Associated Press LOS ANGELES --- The Simon Wiesenthal Center offerd a $25,00 reward Friday in hopes of finding the maker of neo-Nazi video games that have been circulating in Europe. It asked the German government to match the sum. "We believe that this would demonstrate a seriousness to finally bringing these culprits to justice," said Rabbi Marvin Hier, dean of the Los Angeles-based Holocaust research center. The reward was offered for information leading to a conviction. The underground games, which are in German, have strong anti-Jewish and anti-Turkish themes. In one program, KZ Manager, the player must sell gold filings, lampshades and labor to earn money to buy gas and gas chambers to kill Turks at the Treblinka death camp. "KZ" is an abbreviation of the German word for concentration camp. The reward was triggered by a telegram sent by German Chancellor Helmut Kohl to Sen. Alfonse D'Amato, R-N.Y., on Thursday and forwarded to the Wiesenthal Center. D'Amato last week wrote to Kohl and Austrain President Kurt Waldheim, asking them to prevent distribution of the games after the center publicized their apparent spread in Germany, Austria, and the Netherlands. D'Amota's letters cited provisions of the Austrain and German criminal codes that forbid inciting racial hatred. Word of the games has circulated for several years, but reports in the Austrain media indicate they are becoming more widespread, said Rabbi Abraham Cooper, the center's associate dean. In a translated copy of the telegram, Kohl told D'Amato that he is disgusted by the games but indicated that the problem has already passed. "As far as can be ascertained, these products have not appeard since early 1990," Kohl said. "Before that, some of these evil items had emerged, but they were not sold over the counter in normal stores." He said that the games were confiscated when found but that the manufactuer has not been identified. -------------------------------------------------------------------------------- --=] National Security Anarchists [=-- --=] Volume 1, Issue 1 [=-- --=] Presents [=-- --=] World News [=-- "'Cracker' Speaks Out" Written by: UNIX Today! New York--A man identifying himself as as one of the Dutch crackers who was filmed breaking into U.S. computers by Dutch television said last week he found the break-ins to be easy to do. He also said he doesn't believe he did anything wrong. "A guest account is a guest account. I considered myself a guest on the system," said a man who identified himself only as "Hank." Last Wednesday, Hank, who said he was 24 years old, gave a telephone interview to Emmanuel Goldstein, editor of the cracker journal 2600. The interview aired on Goldstein's radio program "Off the Hook," on WBAI-FM, a publicly funded New York alternative radio station. There was no conclusive evidence to indicate whether Hank was genuine, though some details he gave matched those given out by victims of the Dutch crackers and by people with contacts in the cracker community. Hank spoke English with a slight accent. He would not discuss specifics of sites broken into, how he got in or what he found once he was there. Hank said the cracking is its own reward, and when he's logged into a system, he's interested only in the system itself, not the data on it. One radio caller asked whether he'd ever gained access to politicaly interesting information. "When i get onto a system, I'm not interested in the stuff there," he said. "I'm not interested in going throught love letters or anything else." He said if he had access to classified information---something authorities say he did not have--it's the user's fault. "I think it's pretty stupid to put classified data on a public network," he said. Hank said he believes computer laws will not control cracking. "I think it's not a solution to prohibit hacking, because the people will go underground," he said. Hank said he has been cracking about three years, and specializes in breaking into Unix systems. At first, he contacted systems administrators of systems he cracked to alert them to problems. Some of them seemed to want to use the information to correct the problem, but many seemed more interested in hunting him down, he said. And those were the ones most likely to leave security holes uncorrected, he added. He said he searched for default log-ins that were shipped with systems by the manufacturer, and often not changed by users. Goldstein would not comment on how he got in touch with Hank. "I run a hacking publication, and there's one in Holland," he said. He said he believes Hank to be authentic. "Holland isn't that big a place. Everybody knows what everybody else is doing. ------------------------------------------------------------------------------- --=] National Security Anarchists [=-- --=] Volume 1, Issue 1 [=-- --=] Presents [=-- --=] Teleco Briefs [=-- These are brief bits of Teleco information. You may say so fucking what, let's learn how to hack this and that. Well go ahead and do that, you won't get anywhere. Well unless you take the time to realize the dangers that Ma Bell is doing to stop us. ------------------------------------------------------------------------------- ------------------------------------ Teleos Acquires Vadis Technology ------------------------------------ Teleos Communicaitons, Inc., the leading manufacturer of PC-based terminal adapters (PC TA) for ISDN connectivity, has purchased the technology of Vadis, Inc. of Richardson, Texas. The agreement includes a complete technology transfer of Vadis' Microchannel PC TA architecture. Teleos' own PC TA product, the B101PC, is an IBM PC XT/AT-compatible adapter. The acquistion will stregthen Teleos' leading market position and will enable Teleos to broaden its offerings in the low end ofthe PC TA marketplace. -------------------------------------------------- ISDN Products to Reach Eastern European Market -------------------------------------------------- Teleos has appointed Internet its exclusive distributor in Hungary to market the full line of Teleos ISDN customer premises equipment products in that country. Teleos intend to provide global corporate networking solutions to multinational companies by leveraging the public switched environment, such as ISDN. In 1990, Teles demonstrated internation ISDN links with Japan and France. Internet is Teleos' first European distributor. ------------------------------------- Teleos Leasing Corporation Formed ------------------------------------- Users of the emerging ISDN now have the opportunity to finance ISDN Access Server Systems supplied yb Teleos Communications, Inc., through Teleos leasing Cororation (TLC), a joint venture captive finace company recently formed by Teleos and Communication Financial Corporation (CFC). Teleos and CFC are the sole shareholders of Teleos Leasing Corporation. CFC will provide funding and management services for TLC, which operates as a Teleos affiliate and CFC subsidiary. ------------------------------------------------------------------------------- National Security Anarchists "Plagurism is the Basis of Creativity" ## ## ###### ###### ### ## ## ## ## ###### ###### ###### ## ### ## ## ## ## ## ###### ## ## ------------------------------------------------------------------------------- National Security Anarchists "Plagurism is the Basis of Creativity" All Rights Reserved Any modifications to this text file is a violation of copyright - (c) 1991 - -------------------------------------------------------------------------------- Downloaded From P-80 Systems 304-744-2253 Downloaded From P-80 International Information Systems 304-744-2253 12yrs+